BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis

被引:0
作者
Zhang, Yezhou [1 ,2 ]
Li, Lang [1 ,2 ]
Ou, Yu [1 ,2 ]
机构
[1] Hengyang Normal Univ, Coll Comp Sci & Technol, Hengyang 421002, Peoples R China
[2] Hengyang Normal Univ, Hunan Prov Key Lab Intelligent Informat Proc & App, Hengyang 421002, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2025年 / 28卷 / 01期
关键词
Plaintext feature extension; Deep learning; AES; Side-channel analysis; Bilinear pooling;
D O I
10.1007/s10586-024-04701-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning algorithms are increasingly employed to exploit side-channel information, such as power consumption and electromagnetic leakage from hardware devices, significantly enhancing attack capabilities. However, relying solely on power traces for side-channel information often requires adequate domain knowledge. To address this limitation, this work proposes a new attack scheme. Firstly, a Convolutional Neural Network (CNN)-based plaintext-extended bilinear feature fusion model is designed. Secondly, multi-model intermediate layers are fused and trained, yielding in the increase of the amount of effective information and generalization ability. Finally, the model is employed to predict the output probability of three public side-channel datasets (e.g. ASCAD, AES_\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\_$$\end{document}HD, and AES_\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\_$$\end{document}RD), and analyze the recovery key guessing entropy for each key to efficiently assess attack efficiency. Experimental results showcase that the plaintext-extended bilinear feature fusion model can effectively enhance the Side-Channel Attack (SCA) capabilities and prediction performance. Deploying the proposed method, the number of traces required for a successful attack on the ASCAD_\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\_$$\end{document}R dataset is significantly reduced to less than 914, representing an 70.5% reduction in traces compared to the network in Convolutional Neural Network-Visual Geometry Group (CNNVGG16) with plaintext, which incorporating plaintext features before the fully connected layer. Compared to existing solutions, the proposed scheme requires only 80% of the power traces for the attack mask design using only 75 epochs. As a result, the power of the proposed method is well proved through the different experiments and comparison processes.
引用
收藏
页数:12
相关论文
共 27 条
  • [1] A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
    Al-Garadi, Mohammed Ali
    Mohamed, Amr
    Al-Ali, Abdulla Khalid
    Du, Xiaojiang
    Ali, Ihsan
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1646 - 1685
  • [2] An S., 2021, 17 INT C COMP INT SE, P435, DOI [10.1109/CIS54983.2021.00096, DOI 10.1109/CIS54983.2021.00096]
  • [3] [Anonymous], 2017, P BRIT MACH VIS C LO
  • [4] Deep learning for side-channel analysis and introduction to ASCAD database
    Benadjila, Ryad
    Prouff, Emmanuel
    Strullu, Remi
    Cagli, Eleonora
    Dumas, Cecile
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 163 - 188
  • [5] How Machine Learning Changes the Nature of Cyberattacks on IoT Networks: A Survey
    Bout, Emilie
    Loscri, Valeria
    Gallais, Antoine
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (01) : 248 - 279
  • [6] Bronchain O., 2021, IACR Cryptol. ePrint Arch., V817
  • [7] Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
    Cagli, Eleonora
    Dumas, Cecile
    Prouff, Emmanuel
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 45 - 68
  • [8] Coron JS, 2009, LECT NOTES COMPUT SC, V5747, P156
  • [9] A Second Look at the ASCAD Databases
    Egger, Maximilian
    Schamberger, Thomas
    Tebelmann, Lars
    Lippert, Florian
    Sigl, Georg
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2022, 2022, 13211 : 75 - 99
  • [10] A comprehensive survey on deep learning based malware detection techniques
    Gopinath, M.
    Sethuraman, Sibi Chakkaravarthy
    [J]. COMPUTER SCIENCE REVIEW, 2023, 47