Make some noise unleashing the power of convolutional neural networks for profiled side-channel analysis

被引:0
作者
Kim J. [1 ]
Picek S. [1 ]
Heuser A. [2 ]
Bhasin S. [3 ]
Hanjalic A. [1 ]
机构
[1] Delft University of Technology, Delft
[2] Univ Rennes, Inria, CNRS, IRISA
[3] Physical Analysis and Cryptographic Engineering, Temasek Laboratories at Nanyang Technological University
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2019年 / 2019卷 / 03期
关键词
Convolutional Neural Networks; Gaussian noise; Machine learning; Side-channel analysis;
D O I
10.13154/tches.v2019.i3.148-179
中图分类号
学科分类号
摘要
Profiled side-channel analysis based on deep learning, and more precisely Convolutional Neural Networks, is a paradigm showing significant potential. The results, although scarce for now, suggest that such techniques are even able to break cryptographic implementations protected with countermeasures. In this paper, we start by proposing a new Convolutional Neural Network instance able to reach high performance for a number of considered datasets. We compare our neural network with the one designed for a particular dataset with masking countermeasure and we show that both are good designs but also that neither can be considered as a superior to the other one. Next, we address how the addition of artificial noise to the input signal can be actually beneficial to the performance of the neural network. Such noise addition is equivalent to the regularization term in the objective function. By using this technique, we are able to reduce the number of measurements needed to reveal the secret key by orders of magnitude for both neural networks. Our new convolutional neural network instance with added noise is able to break the implementation protected with the random delay countermeasure by using only 3 traces in the attack phase. To further strengthen our experimental results, we investigate the performance with a varying number of training samples, noise levels, and epochs. Our findings show that adding noise is beneficial throughout all training set sizes and epochs. © 2019, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:148 / 179
页数:31
相关论文
共 40 条
  • [1] Brier Eric, Clavier Christophe, Olivier Francis, Correlation Power Analysis with a Leakage Model, CHES, volume 3156 of LNCS, pp. 16-29, (2004)
  • [2] Bishop Chris M, Training with noise is equivalent to tikhonov regularization, Neural computation, 7, 1, pp. 108-116, (1995)
  • [3] Breiman Leo, Random Forests, Machine Learning, 45, 1, pp. 5-32, (2001)
  • [4] Cagli Eleonora, Dumas Cecile, Prouff Emmanuel, Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures-Profiling Attacks Without Pre-processing, Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference, pp. 45-68, (2017)
  • [5] Coron Jean-Sebastien, Kizhvatov Ilya, An Efficient Method for Random Delay Generation in Embedded Software, Cryptographic Hardware and Embedded Systems-CHES 2009, 11th International Workshop, pp. 156-170, (2009)
  • [6] Choudary Omar, Kuhn Markus G., Efficient template attacks, Smart Card Research and Advanced Applications-12th International Conference, CARDIS 2013, pp. 253-270, (2013)
  • [7] Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template Attacks, CHES, volume 2523 of LNCS, pp. 13-28, (2002)
  • [8] Goodfellow Ian, Bengio Yoshua, Courville Aaron, Deep Learning, (2016)
  • [9] Gilmore Richard, Hanley Neil, O'Neill Maire, Neural network based attack on a masked implementation of AES, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 106-111, (2015)
  • [10] Hospodar Gabriel, Gierlichs Benedikt, De Mulder Elke, Verbauwhede Ingrid, Vandewalle Joos, Machine learning in side-channel analysis: a first study, Journal of Cryptographic Engineering, 1, pp. 293-302, (2011)