CN113378894A - Non-invasive application off-line attack method based on side channel power consumption analysis - Google Patents

Non-invasive application off-line attack method based on side channel power consumption analysis Download PDF

Info

Publication number
CN113378894A
CN113378894A CN202110557496.2A CN202110557496A CN113378894A CN 113378894 A CN113378894 A CN 113378894A CN 202110557496 A CN202110557496 A CN 202110557496A CN 113378894 A CN113378894 A CN 113378894A
Authority
CN
China
Prior art keywords
power consumption
data
side channel
attack
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110557496.2A
Other languages
Chinese (zh)
Other versions
CN113378894B (en
Inventor
洪榛
叶尚犇
叶蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN202110557496.2A priority Critical patent/CN113378894B/en
Publication of CN113378894A publication Critical patent/CN113378894A/en
Application granted granted Critical
Publication of CN113378894B publication Critical patent/CN113378894B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/213Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods
    • G06F18/2135Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods based on approximation criteria, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A non-invasive application off-line attack method based on side channel power consumption analysis constructs a side channel attack classifier based on power consumption correlation degree through stages of data acquisition, data processing, feature extraction, classification and the like. An attacker collects physical leakage in the starting process of the application program, conjectures the starting state of the application program of the target equipment by adopting a method of combining side channel power analysis and correlation calculation, classifies and identifies the starting state as a complete event so as to know which application program the target equipment runs, infers sensitive information of the target equipment by utilizing the information leaked by the target equipment, and acquires user privacy. Compared with the traditional side channel attack intrusive method based on the direct-current power supply, the non-intrusive side channel attack method based on the alternating-current power supply is provided, and the method has better concealment.

Description

Non-invasive application off-line attack method based on side channel power consumption analysis
Technical Field
The invention relates to the technical field of side channel attack, in particular to a non-invasive application off-line attack method based on power consumption correlation.
Background
With the rapid development of computer technology, modern computing devices dynamically adjust their power consumption to meet the requirements of the workload. The power consumption information of a computing device changes over time as it performs different tasks. Therefore, as a typical side channel signal, power consumption information of a device is often used for privacy detection and attack. An attacker can infer the current activity of a computing device by analyzing power consumption information of the computing device. Traditional side channel attack methods based on dc power supplies are intrusive, require direct access to internal components of the computing device, and are not realistic.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a non-invasive application program offline attack method based on side channel power consumption analysis.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a non-invasive application program offline attack method based on side channel power consumption analysis comprises the following steps:
(1) data acquisition: setting an automatic data acquisition platform, measuring the power consumption of notebook computers and desktop computers of different operating systems and different brands by using an open-close type current transformer, and acquiring power consumption leakage data of a plurality of different application programs when the application programs run on the computers by using a sound card so as to monitor the power consumption of target equipment;
(2) data processing: carrying out data segmentation on the power consumption signal, separating different running states of the application program from the collected sound file, and dividing the one-time complete running process of the application program into three states of starting, waiting and closing;
(3) feature extraction: after different running states of the application program are separated from the collected sound file, characteristic extraction is carried out on the sound samples;
(4) application program classification: randomly selecting a sample from data collected by different devices as a training sample of the classifier, setting labels as different device models, inputting a signal into the classifier when an attacker obtains a power signal started by an application program, and then determining a device model according to a classification result.
Further, the step (1) comprises the steps of:
1.1: an automatic data acquisition platform is arranged, and an open-close type current transformer is used for measuring the power consumption of notebook computers and desktop computers with different operating systems and brands. Acquiring power consumption leakage data of a plurality of different application programs when the application programs run on a computer through a sound card so as to monitor the power consumption of target equipment;
1.2: the platform realizes the automatic collection of experimental data for multiple times by means of communication among the devices, and the attack device and the target device are positioned in the same local area network in the data collection process in the training stage;
1.3: connecting one end of an open-close type current transformer to an audio interface of attack equipment, and placing a zero line of a patch board connected with target equipment in an induction area of the current transformer;
1.4: and acquiring power consumption data of the target equipment by controlling a sound card of the target equipment.
Still further, the step (2) comprises the following steps:
2.1: carrying out standardization processing on an original alternating current signal to enable the range of the original alternating current signal to be scaled to [ -3,3 ];
2.2: carrying out short-time energy summation on 882 points in the small window to obtain an energy value of each window;
2.3: when the energy of a window exceeds a certain threshold (the short-time energy mean value in the invention), namely the effective part of the starting waveform, the starting state waveform of the application program is separated.
Further, the step (3) introduces a correlation coefficient for measuring the degree of correlation between the two variables; in the invention, a specific application program always presents a similar curve on a starting power track, and power tracks of different application program starting processes have distinguishable differences; the matching degree of the actually detected power track and the power track with the label in the sample database can be presumed according to the correlation coefficient, and the sample label with the highest matching degree is selected as a final judgment result.
The step (3) introduces a correlation coefficient for measuring the degree of correlation between two variables, and comprises the following steps:
3.1: carrying out short-time Fourier transform on the starting state waveform to obtain a time-frequency domain power consumption track;
3.2: and extracting and compressing important features of the time-frequency domain power consumption track by a principal component analysis method, and keeping the results of the first 32 dimensions as the features of the correlation calculation.
The principal component analysis method comprises the following steps:
3.2.1: calculating a sample power trajectory data set X ═ X1,x2,x3,......xnThe mean value of the samples of (u),
Figure BDA0003077713360000031
3.2.2: averaging (i.e., de-centering) each power trace sample to obtain
Figure BDA0003077713360000032
3.2.3: solving covariance matrix by eigenvalue method
Figure BDA0003077713360000033
Characteristic value of (1 [ [ lambda ])123,......,λn} and feature vector { ξ123,......,ξn};
3.2.4: sorting the eigenvalues from big to small, selecting the largest K eigenvalues, and taking the corresponding K eigenvectors as row vectors respectively to form an eigenvector matrix P;
3.2.5: the data is converted into a space constructed by K eigenvectors, i.e., X' ═ PX.
3.2.6: after the input track X and the sample track Y are subjected to feature extraction according to the steps, a Pearson correlation coefficient is calculated, and the formula is as follows:
Figure BDA0003077713360000041
wherein,
Figure BDA0003077713360000042
is the average of the input trace and the samples.
The invention has the following beneficial effects: compared with the traditional side channel attack intrusive method based on the direct-current power supply, the non-intrusive side channel attack method based on the alternating-current power supply is provided, and the method has better concealment.
Drawings
Fig. 1 is a schematic diagram of a "known device" attack scenario.
Fig. 2 is a schematic diagram of a "configure device" attack scenario.
Fig. 3 is a schematic diagram of an attack scenario of "unknown device".
Fig. 4 is a block diagram of an application detection architecture based on side channel power consumption analysis.
Fig. 5 is a block diagram of a side channel attack architecture.
Fig. 6 is a data acquisition flowchart of a non-intrusive application off-line attack method based on side channel power consumption analysis in an embodiment of the present invention;
FIG. 7 is a data processing flowchart of a non-intrusive application off-line attack method based on side channel power consumption analysis according to an embodiment of the present invention;
fig. 8 is a flowchart of feature extraction of a non-intrusive application off-line attack method based on side channel power consumption analysis according to an embodiment of the present invention.
Fig. 9 is a flowchart of principal component analysis of a non-intrusive application off-line attack method based on side channel power consumption analysis according to an embodiment of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
Referring to fig. 1 to 9, an application offline attack method based on power consumption correlation is characterized by including an attack device (desktop/notebook computer), a target device (desktop/notebook computer), an open-close type current transformer (SCT010), and a patch board;
"known device" attack scenario: fig. 1 is a schematic diagram of a "known device" attack scenario. In this attack scenario, the attacker obtains some power consumption leakage information on the victim target device, as well as the true case of the leakage. This may occur if the victim inadvertently provides some application examples to the attacker during chat, such leakage being referred to as "signature data" of the victim, corresponding to the most desirable attack scenario. For the authenticity of the attack, the amount of marking data should be limited to only a few samples per application. The attacker has the most relevant information with the victim in the scene.
Attack scenario "configuration device": fig. 2 is a schematic diagram illustrating a "configure device" attack scenario. In this scenario, the attacker does not have any tag data from the victim target device. In the training phase, the attacker may collect power consumption data from the same type of device as the victim target device and use it as a training set for the experiment. The training set models data acquired by an attacker, so that the power consumption mode of the attacking device is analyzed in the attack stage, and the application program which is being started is presumed.
Attack scenario of "unknown device": fig. 3 is a schematic diagram illustrating an attack scenario of an unknown device. The "unknown device" attack scenario is the most challenging and realistic attack scenario. The attacker does not have any training data for the victim target device, and the obtained information is limited to the leakage of the power consumption of the victim. The target of the attacker is to speculate the victim's device and the running application, and once the attacker learns the current model of the target device through analysis, the attacker can use this information to launch the attack, assuming that the attacker keeps the power consumption database of past attacks. Under the scenario, a side channel attack initiated by an attacker needs target device detection and application program detection.
During the attack, the victim runs some applications on the target device. In all scenarios presented in section 1.1, the attacker has performed ac power tracking on the victim's computer. Fig. 4 is a block diagram of an application detection structure based on side channel power consumption analysis, which is divided into a training phase and an attack phase.
A training stage: in the training phase, an attacker performs power consumption training data acquisition of a target application program on a target device or a device of the same model as the target device. Firstly, the collected alternating current signals are standardized to enable the range of the signals to be scaled to [ -3,3], then short-time energy summation is carried out on points in a small window, and effective parts of starting waveforms are segmented according to threshold values. And finally, performing feature extraction on the segmented starting state waveform, and inputting the starting state waveform into a classifier for training. The training phase also includes training of learning models, such as supervised classifiers, to generate an offline database for invocation by the attack detection phase.
And (3) attack stage: the attack phase typically consists of three steps. (1) Placing a current sensor on a zero line of a patch board connected with target equipment or a zero line of a corresponding ammeter, and waiting for starting a target application program; (2) observing leaked side channel information based on the collected information; (3) sensitive information is inferred using a previously established model.
In the "known device" scenario and the "configured device" scenario, an attacker obtains corresponding power consumption traces on the target device (the "known device" scenario) or on the same model device (the "configured device" scenario). As shown in the structural diagram 5 of the side channel attack in these two cases, an attacker first preprocesses the collected power consumption trajectory, then segments the preprocessed data, extracts an effective waveform of the application program at the start stage as its feature, and finally classifies the application program by using the obtained data as a training set.
In the "unknown device" analysis scenario, since the attacker does not know the target device of the victim, the target device class needs to be identified according to the ac power consumption trajectory, and then the running application is classified using correct training data.
The invention provides a non-invasive application off-line attack method based on side channel power consumption analysis, which constructs a side channel attack classifier based on power consumption correlation degree through stages of data acquisition, data processing, feature extraction, classification and the like, and the 3 stages are respectively introduced below by combining with figures 6-8.
A non-invasive application program offline attack method based on side channel power consumption analysis comprises the following steps:
(1) data acquisition: setting an automatic data acquisition platform, measuring the power consumption of notebook computers and desktop computers of different operating systems and different brands by using an open-close type current transformer, and acquiring power consumption leakage data of a plurality of different application programs when the application programs run on the computers by using a sound card so as to monitor the power consumption of target equipment;
(2) data processing: carrying out data segmentation on the power consumption signal, separating different running states of the application program from the collected sound file, and dividing the one-time complete running process of the application program into three states of starting, waiting and closing;
(3) feature extraction: after different running states of the application program are separated from the collected sound file, characteristic extraction is carried out on the sound samples;
(4) application program classification: randomly selecting a sample from data collected by different devices as a training sample of the classifier, setting labels as different device models, inputting a signal into the classifier when an attacker obtains a power signal started by an application program, and then determining a device model according to a classification result.
As shown in fig. 6, the non-intrusive application off-line attack method based on side channel power consumption analysis according to the present invention performs data acquisition according to the following steps:
1.1: an automatic data acquisition platform is arranged, and an open-close type current transformer is used for measuring the power consumption of notebook computers and desktop computers with different operating systems and brands. Acquiring power consumption leakage data of a plurality of different application programs when the application programs run on a computer through a sound card so as to monitor the power consumption of target equipment;
1.2: the platform realizes the automatic collection of experimental data for multiple times by means of communication among the devices, and the attack device and the target device are positioned in the same local area network in the data collection process in the training stage;
1.3: connecting one end of an open-close type current transformer to an audio interface of attack equipment, and placing a zero line of a patch board connected with target equipment in an induction area of the current transformer;
1.4: and acquiring power consumption data of the target equipment by controlling a sound card of the target equipment.
As shown in fig. 7, the non-intrusive application off-line attack method based on side channel power consumption analysis according to the present invention performs data processing according to the following steps:
2.1: carrying out standardization processing on an original alternating current signal to enable the range of the original alternating current signal to be scaled to [ -3,3 ];
2.2: carrying out short-time energy summation on 882 points in the small window to obtain an energy value of each window;
2.3: when the energy of a window exceeds a certain threshold (the short-time energy mean value in the invention), namely the effective part of the starting waveform, the starting state waveform of the application program is separated.
As shown in fig. 8, the non-intrusive application off-line attack method based on side channel power consumption analysis according to the present invention performs feature extraction according to the following steps:
3.1: carrying out short-time Fourier transform on the starting state waveform to obtain a time-frequency domain power consumption track;
3.2: and extracting and compressing important features of the time-frequency domain power consumption track by a principal component analysis method, and keeping the results of the first 32 dimensions as the features of the correlation calculation.
As shown in fig. 9, the non-intrusive application off-line attack method based on side channel power consumption analysis according to the present invention performs principal component analysis according to the following steps:
3.2.1: calculating a sample power trajectory data set X ═ X1,x2,x3,......xnThe mean value of the samples of (u),
Figure BDA0003077713360000081
3.2.2: averaging (i.e., de-centering) each power trace sample to obtain
Figure BDA0003077713360000082
3.2.3: solving covariance matrix by eigenvalue method
Figure BDA0003077713360000091
Characteristic value of (1 [ [ lambda ])123,......,λn} and feature vector { ξ123,......,ξn};
3.2.4: sorting the eigenvalues from big to small, selecting the largest K eigenvalues, and taking the corresponding K eigenvectors as row vectors respectively to form an eigenvector matrix P;
3.2.5: converting the data into a space constructed by K eigenvectors, namely X' ═ PX;
3.2.6: after the input track X and the sample track Y are subjected to feature extraction according to the steps, a Pearson correlation coefficient is calculated, and the formula is as follows:
Figure BDA0003077713360000092
wherein,
Figure BDA0003077713360000093
is the average of the input trace and the samples.
By adopting the non-invasive application off-line attack method based on side channel power consumption analysis, a classifier of side channel off-line attack based on power consumption correlation is constructed through stages of data acquisition, data processing, feature extraction, classification and the like, and the side channel attack performance of the proposed classifier is evaluated. The experiment mainly aims at the three attack scenes of the known equipment, the configured equipment and the unknown equipment, and adopts Top-n accuracy rate to evaluate the side channel attack performance based on power consumption analysis under the offline condition, so that the side channel attack effect of an attacker on target equipment of different brands and different systems is better, and the accuracy rate can reach more than 92.6%.
The embodiments described in this specification are merely illustrative of implementations of the inventive concepts, which are intended for purposes of illustration only. The scope of the present invention should not be construed as being limited to the particular forms set forth in the examples, but rather as being defined by the claims and the equivalents thereof which can occur to those skilled in the art upon consideration of the present inventive concept.

Claims (5)

1. A non-invasive application off-line attack method based on side channel power consumption analysis is characterized by comprising the following steps:
(1) data acquisition: setting an automatic data acquisition platform, measuring the power consumption of notebook computers and desktop computers of different operating systems and different brands by using an open-close type current transformer, and acquiring power consumption leakage data of a plurality of different application programs when the application programs run on the computers by using a sound card so as to monitor the power consumption of target equipment;
(2) data processing: carrying out data segmentation on the power consumption signal, separating different running states of the application program from the collected sound file, and dividing the one-time complete running process of the application program into three states of starting, waiting and closing;
(3) feature extraction: after different running states of the application program are separated from the collected sound file, characteristic extraction is carried out on the sound samples;
(4) application program classification: randomly selecting a sample from data collected by different devices as a training sample of the classifier, setting labels as different device models, inputting a signal into the classifier when an attacker obtains a power signal started by an application program, and then determining a device model according to a classification result.
2. The non-intrusive application offline attack method based on side-channel power consumption analysis according to claim 1, wherein the step (1) comprises the steps of:
1.1: an automatic data acquisition platform is arranged, and an open-close type current transformer is used for measuring the power consumption of notebook computers and desktop computers with different operating systems and brands. Acquiring power consumption leakage data of a plurality of different application programs when the application programs run on a computer through a sound card so as to monitor the power consumption of target equipment;
1.2: the platform realizes the automatic collection of experimental data for multiple times by means of communication among the devices, and the attack device and the target device are positioned in the same local area network in the data collection process in the training stage;
1.3: connecting one end of an open-close type current transformer to an audio interface of attack equipment, and placing a zero line of a patch board connected with target equipment in an induction area of the current transformer;
1.4: and acquiring power consumption data of the target equipment by controlling a sound card of the target equipment.
3. The non-intrusive application offline attack method based on side-channel power consumption analysis according to claim 1 or 2, wherein the step (2) comprises the steps of:
2.1: carrying out standardization processing on an original alternating current signal to enable the range of the original alternating current signal to be scaled to [ -3,3 ];
2.2: carrying out short-time energy summation on 882 points in the small window to obtain an energy value of each window;
2.3: and when the energy of one window exceeds the short-time energy average value, namely the energy is an effective part of the starting waveform, and the starting state waveform of the application program is separated.
4. The non-intrusive application off-line attack method based on side channel power consumption analysis as defined in claim 1 or 2, wherein the step (3) introduces a correlation coefficient for measuring the degree of correlation between two variables, and comprises the following steps:
3.1: carrying out short-time Fourier transform on the starting state waveform to obtain a time-frequency domain power consumption track;
3.2: and extracting and compressing important features of the time-frequency domain power consumption track by a principal component analysis method, and keeping the results of the first 32 dimensions as the features of the correlation calculation.
5. The non-intrusive application off-line attack method based on side-channel power consumption analysis of claim 4, wherein the principal component analysis method comprises the steps of:
3.2.1: calculating a sample power trajectory data set X ═ X1,x2,x3,......xnThe mean value of the samples of (u),
Figure FDA0003077713350000021
3.2.2: averaging each power track sample to obtain
Figure FDA0003077713350000022
3.2.3: solving covariance matrix by eigenvalue method
Figure FDA0003077713350000023
Characteristic value of (1 [ [ lambda ])123,......,λn} and feature vector { ξ123,......,ξn};
3.2.4: sorting the eigenvalues from big to small, selecting the largest K eigenvalues, and taking the corresponding K eigenvectors as row vectors respectively to form an eigenvector matrix P;
3.2.5: converting the data into a space constructed by K eigenvectors, namely X' ═ PX;
3.2.6: after the input track X and the sample track Y are subjected to feature extraction according to the steps, a Pearson correlation coefficient is calculated, and the formula is as follows:
Figure FDA0003077713350000024
wherein,
Figure FDA0003077713350000025
is the average of the input trace and the samples.
CN202110557496.2A 2021-05-21 2021-05-21 Non-invasive application offline attack method based on side channel power consumption analysis Active CN113378894B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110557496.2A CN113378894B (en) 2021-05-21 2021-05-21 Non-invasive application offline attack method based on side channel power consumption analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110557496.2A CN113378894B (en) 2021-05-21 2021-05-21 Non-invasive application offline attack method based on side channel power consumption analysis

Publications (2)

Publication Number Publication Date
CN113378894A true CN113378894A (en) 2021-09-10
CN113378894B CN113378894B (en) 2024-04-19

Family

ID=77571584

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110557496.2A Active CN113378894B (en) 2021-05-21 2021-05-21 Non-invasive application offline attack method based on side channel power consumption analysis

Country Status (1)

Country Link
CN (1) CN113378894B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110390357A (en) * 2019-07-17 2019-10-29 国网浙江省电力有限公司电力科学研究院 A kind of DTU safety monitoring method based on side channel
CN112787971A (en) * 2019-11-01 2021-05-11 国民技术股份有限公司 Construction method of side channel attack model, password attack equipment and computer storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110390357A (en) * 2019-07-17 2019-10-29 国网浙江省电力有限公司电力科学研究院 A kind of DTU safety monitoring method based on side channel
CN112787971A (en) * 2019-11-01 2021-05-11 国民技术股份有限公司 Construction method of side channel attack model, password attack equipment and computer storage medium

Also Published As

Publication number Publication date
CN113378894B (en) 2024-04-19

Similar Documents

Publication Publication Date Title
Raghuveera et al. A depth-based Indian sign language recognition using microsoft kinect
CN108962237B (en) Hybrid speech recognition method, device and computer readable storage medium
Ahmed et al. Vision based hand gesture recognition using dynamic time warping for Indian sign language
Choi et al. Automatic segmentation of latent fingerprints
Bautista et al. Probability-based dynamic time warping for gesture recognition on RGB-D data
CN107833211B (en) Infrared image-based zero value insulator automatic detection method and device
WO2009090584A2 (en) Method and system for activity recognition and its application in fall detection
Ahmed et al. Appearance-based arabic sign language recognition using hidden markov models
CN111209935B (en) Unsupervised target detection method and system based on self-adaptive domain transfer
Rukhiran et al. Effecting of environmental conditions to accuracy rates of face recognition based on IoT solution
CN114818824A (en) Motor imagery transfer learning method based on Pluker analysis
Chouchane et al. Improving CNN-based Person Re-identification using score Normalization
CN109858511B (en) Safe semi-supervised overrun learning machine classification method based on collaborative representation
CN116895286B (en) Printer fault monitoring method and related device
CN113378894B (en) Non-invasive application offline attack method based on side channel power consumption analysis
Park et al. Pc-adapter: Topology-aware adapter for efficient domain adaption on point clouds with rectified pseudo-label
Lee et al. An improved P300 extraction using ICA-R for P300-BCI speller
Khoirunnisa et al. Implementing principal component analysis and multinomial logit for cancer detection based on microarray data classification
Mitiche et al. Naive bayes multi-label classification approach for high-voltage condition monitoring
CN109255318A (en) Based on multiple dimensioned and multireel lamination Fusion Features fingerprint activity test methods
CN113297570B (en) Convolution neural network-based application program online attack method
Tan et al. Face recognition algorithm based on open CV
Zhuo et al. Pattern Recognition for the Working Condition Diagnosis of Oil Well Based on Electrical Parameters
Bose et al. Human face and facial parts detection using template matching technique
Alizadeh et al. Automatic detection of people getting into a bus in a smart public transportation system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant