Hybrid Cryptographic Monitoring System for Side-Channel Attack Detection on PYNQ SoCs
By: Nishant Chinnasami, Rasha Karakchi
Potential Business Impact:
Protects secret codes from being broken by hackers.
AES-128 encryption is theoretically secure but vulnerable in practical deployments due to timing and fault injection attacks on embedded systems. This work presents a lightweight dual-detection framework combining statistical thresholding and machine learning (ML) for real-time anomaly detection. By simulating anomalies via delays and ciphertext corruption, we collect timing and data features to evaluate two strategies: (1) a statistical threshold method based on execution time and (2) a Random Forest classifier trained on block-level anomalies. Implemented on CPU and FPGA (PYNQ-Z1), our results show that the ML approach outperforms static thresholds in accuracy, while maintaining real-time feasibility on embedded platforms. The framework operates without modifying AES internals or relying on hardware performance counters. This makes it especially suitable for low-power, resource-constrained systems where detection accuracy and computational efficiency must be balanced.
Similar Papers
Real-time ML-based Defense Against Malicious Payload in Reconfigurable Embedded Systems
Cryptography and Security
Finds bad code hidden in computer chips.
Machine Learning-Based AES Key Recovery via Side-Channel Analysis on the ASCAD Dataset
Cryptography and Security
Finds secret codes by listening to computer signals.
Attack-Specialized Deep Learning with Ensemble Fusion for Network Anomaly Detection
Cryptography and Security
Finds hidden computer attacks better than before.