Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning

被引:0
作者
Bursztein, Elie [1 ]
Invernizzi, Luca [2 ]
Král, Karel [2 ]
Moghimi, Daniel [1 ]
Picod, Jean-Michel [2 ]
Zhang, Marina [1 ]
机构
[1] Google, Sunnyvale
[2] Google, Zurich
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2024年 / 2024卷 / 03期
关键词
AES; Deep Learning; ECC; Side-Channel Analysis;
D O I
10.46586/tches.v2024.i3.472-499
中图分类号
学科分类号
摘要
To make cryptographic processors more resilient against side-channel attacks, engineers have developed various countermeasures. However, the effectiveness of these countermeasures is often uncertain, as it depends on the complex interplay between software and hardware. Assessing a countermeasure’s effectiveness using profiling techniques or machine learning so far requires significant expertise and effort to be adapted to new targets which makes those assessments expensive. We argue that including cost-effective automated attacks will help chip design teams to quickly evaluate their countermeasures during the development phase, paving the way to more secure chips. In this paper, we lay the foundations toward such automated system by proposing GPAM, the first deep-learning system for power side-channel analysis that generalizes across multiple cryptographic algorithms, implementations, and side-channel counter-measures without the need for manual tuning or trace preprocessing. We demonstrate GPAM’s capability by successfully attacking four hardened hardware-accelerated elliptic-curve digital-signature implementations. We showcase GPAM’s ability to generalize across multiple algorithms by attacking a protected AES implementation and achieving comparable performance to state-of-the-art attacks, but without manual trace curation and within a limited budget. We release our data and models as an open-source contribution to allow the community to independently replicate our results and build on them. © 2024, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:472 / 499
页数:27
相关论文
共 83 条
[1]  
Abadi Martin, Agarwal Ashish, Barham Paul, Brevdo Eugene, Chen Zhifeng, Citro Craig, Corrado Greg S., Davis Andy, Dean Jeffrey, Devin Matthieu, Ghemawat Sanjay, Goodfellow Ian, Harp Andrew, Irving Geoffrey, Isard Michael, Jia Yangqing, Jozefowicz Rafal, Kaiser Lukasz, Kudlur Manjunath, Levenberg Josh, Mane Dandelion, Monga Rajat, Moore Sherry, Murray Derek, Olah Chris, Schuster Mike, Shlens Jonathon, Steiner Benoit, Sutskever Ilya, Talwar Kunal, Tucker Paul, Vanhoucke Vincent, Vasudevan Vijay, V
[2]  
Acharya Rabin Y., Ganji Fatemeh, Forte Domenic, Information theory-based evolution of neural networks for side-channel analysis, IACR Transactions on Cryptographic Hardware and Embedded Systems, (2023)
[3]  
Bursztein Elie, Et al., SCAAML: Side channel attacks assisted with machine learning, (2019)
[4]  
Bhasin Shivam, Chattopadhyay Anupam, Heuser Annelie, Jap Dirmanto, Picek Stjepan, Ranjan Ritu, Mind the portability: A warriors guide through realistic profiled side-channel analysis, Network and Distributed System Security Symposium, (2020)
[5]  
Bahri Dara, Jiang Heinrich, Schuster Tal, Rostamizadeh Afshin, Is margin all you need? an extensive empirical study of active learning on tabular data, (2022)
[6]  
Benadjila Ryad, Khati Louiza, Prouff Emmanuel, Thillard Adrian, Hardened library for AES-128 encryption/decryption on ARM Cortex M4 architecture, (2020)
[7]  
Bursztein Elie, Picod Jean-Michel, A hacker guide to deep learning based side channel attacks, DEF CON, 27, (2019)
[8]  
Belaid Sonia, Rivain Matthieu, High order side-channel security for elliptic-curve implementations, IACR Transactions on Cryptographic Hardware and Embedded Systems, (2023)
[9]  
Benger Naomi, Van de Pol Joop, Smart Nigel P., Yarom Yuval, Ooh Aah… Just a Little Bit”: a small amount of side channel can go a long way, Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International Workshop, (2014)
[10]  
Chollet Francois, Et al., Keras, (2015)