WICCON 2025

WICCON 2025

Hardware Hacking with Artificial Intelligence
2025-10-31 , Workshop

Obtaining passwords through the power consumption of a chip: Myth or Real? In this hardware hacking workshop, you'll get hands-on experience in extracting secret information using artificial intelligence. The workshop consists of a short theoretical introduction to side-channel analysis, followed by a real-world attack using popular deep-learning techniques.


In everyday life, embedded devices are integrated everywhere: from your washing machine to your smartcard. The information processed by these devices are secured through encryption algorithms. However, devices can leak information about critical parts of the algorithm through physical phenomenon, such as power consumption, execution time or radiation.

In side-channel analysis, this information can be analyzed using statistics or deep learning to obtain encryption keys. In this workshop, we will focus on breaking a small embedded device - the ARM Cortex M4 - by retrieving the key of AES through deep-learning based side-channel analysis.

For this workshop, you'll need to bring a laptop with Python 3 and Jupyter Notebook installed. The dataset and package requirement list will be provided by us.

I'm a researcher at Radboud University, where I work on deep learning-based side-channel analysis. I started in this field during my Ph.D. at TU Delft. My research interests include the security of small hardware, side-channel analysis of post-quantum cryptography, and exploring how deep learning techniques can advance this area. Of all the side activities related to working in academia, I enjoy meeting new people and discovering new places the most, which means I'm looking forward to all the interesting discussions we can have during the WICCON workshop.

Lizzy is currently a PhD candidate at the Institute for Computing and Information Sciences (iCIS) at the Radboud University. With a background in both Cyber Security and Artificial Intelligence, she is currently doing research in AI-assisted physical attacks on cryptographic implementations. Next to doing research, Lizzy likes to teach classes and supervise students.
When not working, she is playing with her two cats, reading books, doing sports or making music.

Linktree: https://bruteforcemisa.github.io