Information Theory-based Evolution of Neural Networks for Side-channel Analysis

被引:0
作者
Acharya R.Y. [1 ]
Ganji F. [2 ]
Forte D. [1 ]
机构
[1] University of Florida, Gainesville
[2] Worcester Polytechnic Institute, Worcester
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2022年 / 2023卷 / 01期
关键词
Evolutionary Strategies; Information Theory; Multi-layer Perceptrons; Neural Networks; Side-channel Analysis; Stacking;
D O I
10.46586/tches.v2023.i1.401-437
中图分类号
学科分类号
摘要
Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract the secret key. When combined with advanced methods in neural networks (NNs), profiled SCA can successfully attack even those crypto-cores assumed to be protected against SCA. Despite the rise in the number of studies devoted to NN-based SCA, a range of questions has remained unanswered, namely: how to choose an NN with an adequate configuration, how to tune the NN’s hyperparameters, when to stop the training, etc. Our proposed approach, “InfoNEAT,” tackles these issues in a natural way. InfoNEAT relies on the concept of neural structure search, enhanced by information-theoretic metrics to guide the evolution, halt it with novel stopping criteria, and improve time-complexity and memory footprint. The performance of InfoNEAT is evaluated by applying it to publicly available datasets composed of real side-channel measurements. In addition to the considerable advantages regarding the automated configuration of NNs, InfoNEAT demonstrates significant improvements over other approaches for effective key recovery in terms of the number of epochs (e.g.,×6 faster) and the number of attack traces compared to both MLPs and CNNs (e.g., up to 1000s fewer traces to break a device) as well as a reduction in the number of trainable parameters compared to MLPs (e.g., by the factor of up to 32). Furthermore, through experiments, it is demonstrated that InfoNEAT’s models are robust against noise and desynchronization in traces. © 2022, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:401 / 437
页数:36
相关论文
共 94 条
[51]  
Martinasek Zdenek, Hajny Jan, Malina Lukas, Optimization of power analysis using neural network, Intrl. Conf. on Smart Card Research and Advanced Applications, pp. 94-107, (2013)
[52]  
Maghrebi Houssem, Portigliatti Thibault, Prouff Emmanuel, Breaking cryptographic implementations using deep learning techniques, Intrl. Conf. on Security, Privacy, and Applied Cryptography Engineering, pp. 3-26, (2016)
[53]  
Morse Gregory, Stanley Kenneth O, Simple evolutionary optimization can rival stochastic gradient descent in neural networks, Proceedings of the Genetic and Evolutionary Computation Conf, 2016, pp. 477-484, (2016)
[54]  
Masure Loic, Strullu Remi, Side channel analysis against the anssi’s protected aes implementation on arm, Cryptology ePrint Archive, (2021)
[55]  
Murphy Kevin P, Machine Learning: A Probabilistic Perspective, (2012)
[56]  
Threshold cryptography project, (2020)
[57]  
Omelianenko Iaroslav, Hands-On Neuroevolution with Python: Build high-performing artificial neural network architectures using neuroevolution-based algorithms, (2019)
[58]  
Perin Guilherme, Buhan Ileana, Picek Stjepan, Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis, IACR Cryptol. ePrint Arch, 2020, (2020)
[59]  
Perin Guilherme, Chmielewski Lukasz, Picek Stjepan, Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis, IACR Trans. on Cryptographic Hardware and Embedded Systems, pp. 337-364, (2020)
[60]  
Picek Stjepan, Heuser Annelie, Jovic Alan, Bhasin Shivam, Regazzoni Francesco, The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations, IACR Trans. on Cryptographic Hardware and Embedded Systems, 2019, 1, pp. 1-29, (2019)