Information Theory-based Evolution of Neural Networks for Side-channel Analysis

被引:0
作者
Acharya R.Y. [1 ]
Ganji F. [2 ]
Forte D. [1 ]
机构
[1] University of Florida, Gainesville
[2] Worcester Polytechnic Institute, Worcester
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2022年 / 2023卷 / 01期
关键词
Evolutionary Strategies; Information Theory; Multi-layer Perceptrons; Neural Networks; Side-channel Analysis; Stacking;
D O I
10.46586/tches.v2023.i1.401-437
中图分类号
学科分类号
摘要
Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract the secret key. When combined with advanced methods in neural networks (NNs), profiled SCA can successfully attack even those crypto-cores assumed to be protected against SCA. Despite the rise in the number of studies devoted to NN-based SCA, a range of questions has remained unanswered, namely: how to choose an NN with an adequate configuration, how to tune the NN’s hyperparameters, when to stop the training, etc. Our proposed approach, “InfoNEAT,” tackles these issues in a natural way. InfoNEAT relies on the concept of neural structure search, enhanced by information-theoretic metrics to guide the evolution, halt it with novel stopping criteria, and improve time-complexity and memory footprint. The performance of InfoNEAT is evaluated by applying it to publicly available datasets composed of real side-channel measurements. In addition to the considerable advantages regarding the automated configuration of NNs, InfoNEAT demonstrates significant improvements over other approaches for effective key recovery in terms of the number of epochs (e.g.,×6 faster) and the number of attack traces compared to both MLPs and CNNs (e.g., up to 1000s fewer traces to break a device) as well as a reduction in the number of trainable parameters compared to MLPs (e.g., by the factor of up to 32). Furthermore, through experiments, it is demonstrated that InfoNEAT’s models are robust against noise and desynchronization in traces. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:401 / 437
页数:36
相关论文
共 94 条
[11]  
Bronchain Olivier, Hendrickx Julien M, Massart Clement, Olshevsky Alex, Standaert Francois-Xavier, Leakage certification revisited: Bounding model errors in side-channel security evaluations, Annual Intrl. Cryptol. Conf, pp. 713-737, (2019)
[12]  
Bhasin Shivam, Jap Dirmanto, Picek Stjepan, AES HD dataset-500 000 traces, AISyLab repository, (2020)
[13]  
Benadjila Ryad, Prouff Emmanuel, Strullu Remi, Cagli Eleonora, Dumas Cecile, ASCADv1 Dataset: the atmega8515 sca campaigns, (2017)
[14]  
Benadjila Ryad, Prouff Emmanuel, Strullu Remi, Cagli Eleonora, Dumas Cecile, Study of deep learning techniques for side-channel analysis and introduction to ascad database, (2018)
[15]  
Baldominos Alejandro, Saez Yago, Isasi Pedro, On the automated, evolutionary design of neural networks: past, present, and future, Neural computing and applications, 32, 2, pp. 519-545, (2020)
[16]  
Caamano Pilar, Bellas Francisco, Duro Richard J, τ-neat: Initial experiments in precise temporal processing through neuroevolution, Neuro-computing, 150, pp. 43-49, (2015)
[17]  
Cagli Eleonora, Dumas Cecile, Prouff Emmanuel, Convolutional neural networks with data augmentation against jitter-based countermeasures, Intrl. Conf. on Cryptographic Hardware and Embedded Systems, pp. 45-68, (2017)
[18]  
Cheng John Runwei, Gen Mitsuo, Accelerating genetic algorithms with gpu computing: A selective overview, Computers & Industrial Engineering, 128, pp. 514-525, (2019)
[19]  
Cover Thomas M, Elements of information theory, (1999)
[20]  
Chari Suresh, Rao Josyula R, Rohatgi Pankaj, Template attacks, Intrl. Workshop on Cryptographic Hardware and Embedded Systems, pp. 13-28, (2002)