Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis

被引:1
作者
Yap T. [1 ]
Benamira A. [1 ]
Bhasin S. [1 ]
Peyrin T. [1 ]
机构
[1] School of Physical and Mathematical Sciences, Nanyang Technological University
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2023年 / 2023卷 / 02期
关键词
Deep Learning; Interpretability; Neural Network; Profiling attack; SAT; Side-channel;
D O I
10.46586/tches.v2023.i2.24-53
中图分类号
学科分类号
摘要
Deep neural networks (DNN) have become a significant threat to the security of cryptographic implementations with regards to side-channel analysis (SCA), as they automatically combine the leakages without any preprocessing needed, leading to a more efficient attack. However, these DNNs for SCA remain mostly black-box algorithms that are very difficult to interpret. Benamira et al. recently proposed an interpretable neural network called Truth Table Deep Convolutional Neural Network (TT-DCNN), which is both expressive and easier to interpret. In particular, a TT-DCNN has a transparent inner structure that can entirely be transformed into SAT equations after training. In this work, we analyze the SAT equations extracted from a TT-DCNN when applied in SCA context, eventually obtaining the rules and decisions that the neural networks learned when retrieving the secret key from the cryptographic primitive (i.e., exact formula). As a result, we can pinpoint the critical rules that the neural network uses to locate the exact Points of Interest (PoIs). We validate our approach first on simulated traces for higher-order masking. However, applying TT-DCNN on real traces is not straightforward. We propose a method to adapt TT-DCNN for application on real SCA traces containing thousands of sample points. Experimental validation is performed on software-based ASCADv1 and hardware-based AES_HD_ext datasets. In addition, TT-DCNN is shown to be able to learn the exact countermeasure in a best-case setting. © 2023, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:24 / 53
页数:29
相关论文
共 64 条
  • [1] Agrawal Dakshi, Archambeault Bruce, Rao Josyula R., Rohatgi Pankaj, The EM Side—Channel(s), Cryptographic Hardware and Embedded Systems-CHES 2002, pp. 29-45, (2003)
  • [2] Araujo Andre, Norris Wade, Sim Jack, Computing Re-ceptive Fields of Convolutional Neural Networks, Distil l, (2019)
  • [3] Bach Sebastian, Binder Alexander, Montavon Gregoire, Klauschen Frederick, Muller Klaus-Robert, Samek Wojciech, On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation, PloS one, 10, 7, (2015)
  • [4] Brier Eric, Clavier Christophe, Olivier Francis, Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems-CHES 2004, pp. 16-29, (2004)
  • [5] Blake Archie, Corrections to Canonical expressions in Boolean algebra, Journal of Symbolic Logic, 3, 2, pp. 112-113, (1938)
  • [6] Bartkewitz Timo, Lemke-Rust Kerstin, Efficient template attacks based on probabilistic multi-class support vector machines, International Conference on Smart Card Research and Advanced Applications, pp. 263-276, (2012)
  • [7] Benamira Adrien, Peyrin Thomas, Kuen-Yew Bryan Hooi, Truth-table net: A new convolutional architecture encodable by design into sat formulas, (2022)
  • [8] Benadjila Ryad, Prouff Emmanuel, Strullu Remi, Cagli Eleonora, Dumas Cecile, Deep learning for side-channel analysis and introduction to ASCAD database, J. Cryptogr. Eng, 10, 2, pp. 163-188, (2020)
  • [9] Bracewell R.N., The Fourier Transform and its Applications, (1978)
  • [10] Cagli Eleonora, Dumas Cecile, Prouff Emmanuel, Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures, Cryptographic Hardware and Embedded Systems – CHES 2017, pp. 45-68, (2017)