Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis

被引:0
作者
Perin G. [1 ,2 ]
Chmielewski Ł. [1 ]
Picek S. [2 ]
机构
[1] Riscure BV, Netherlands
[2] Delft University of Technology, Netherlands
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2020年 / 2020卷 / 04期
基金
欧盟地平线“2020”;
关键词
Ensemble Learning; Model Generalization; Neural Networks; Side-channel Analysis;
D O I
10.13154/tches.v2020.i4.337-364
中图分类号
学科分类号
摘要
The adoption of deep neural networks for profiled side-channel attacks provides powerful options for leakage detection and key retrieval of secure products. When training a neural network for side-channel analysis, it is expected that the trained model can implement an approximation function that can detect leaking side-channel samples and, at the same time, be insensible to noisy (or non-leaking) samples. This outlines a generalization situation where the model can identify the main representations learned from the training set in a separate test set. This paper discusses how output class probabilities represent a strong metric when conducting the side-channel analysis. Further, we observe that these output probabilities are sensitive to small changes, like selecting specific test traces or weight initialization for a neural network. Next, we discuss the hyperparameter tuning, where one commonly uses only a single out of dozens of trained models, where each of those models will result in different output probabilities. We show how ensembles of machine learning models based on averaged class probabilities can improve gen-eralization. Our results emphasize that ensembles increase a profiled side-channel attack’s performance and reduce the variance of results stemming from different hyperparameters, regardless of the selected dataset or leakage model. © 2020, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:337 / 364
页数:27
相关论文
共 41 条
[1]  
Bhasin Shivam, Chattopadhyay Anupam, Heuser Annelie, Jap Dirmanto, Picek Stjepan, Shrivastwa Ritu Ranjan, Mind the portability: A warriors guide through realistic profiled side-channel analysis, IACR Cryptology ePrint Archive, 2019, (2019)
[2]  
Brier Eric, Clavier Christophe, Olivier Francis, Correlation power analysis with a leakage model, Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, volume 3156 of Lecture Notes in Computer Science, pp. 16-29, (2004)
[3]  
Batina Lejla, Gierlichs Benedikt, Lemke-Rust Kerstin, Differential cluster analysis, Cryptographic Hardware and Embedded Systems-CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, volume 5747 of Lecture Notes in Computer Science, pp. 112-127
[4]  
Carbone Mathieu, Conin Vincent, Cornelie Marie-Angela, Das-sance Francois, Dufresne Guillaume, Dumas Cecile, Prouff Emmanuel, Venelli Alexandre, Deep learning to evaluate secure RSA implementations, IACR Trans. Cryptogr. Hardw. Embed. Syst, 2019, 2, pp. 132-161, (2019)
[5]  
Cagli Eleonora, Dumas Cecile, Prouff Emmanuel, Convolutional neural networks with data augmentation against jitter-based countermeasures-profiling attacks without pre-processing, Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings, volume 10529 of Lecture Notes in Computer Science, pp. 45-68
[6]  
Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template attacks, Cryptographic Hardware and Embedded Systems-CHES 2002, 4th International Workshop, pp. 13-28, (2002)
[7]  
Francillon Aurelien, Rohatgi Pankaj, Smart Card Research and Advanced Applications-12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013
[8]  
Gierlichs Benedikt, Batina Lejla, Tuyls Pim, Preneel Bart, Mutual information analysis, Cryptographic Hardware and Embedded Systems-CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, volume 5154 of Lecture Notes in Computer Science, pp. 426-442, (2008)
[9]  
Gardner Matt W, Dorling SR, Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences, Atmospheric environment, 32, 14-15, pp. 2627-2636, (1998)
[10]  
Hettwer Benjamin, Gehrer Stefan, Guneysu Tim, Profiled power analysis attacks using convolutional neural networks with domain knowledge, Selected Areas in Cryptography-SAC 2018-25th International Conference, pp. 479-498, (2018)