A comprehensive study of deep learning for side-channel analysis

被引:0
|
作者
Masure L. [1 ,2 ]
Dumas C. [1 ]
Prouff E. [2 ,3 ]
机构
[1] Univ. Grenoble Alpes, CEA, LETI, DSYS, CESTI, Grenoble
[2] Sorbonne Universités, UPMC Univ Paris 06, POLSYS, UMR 7606, LIP6, Paris
来源
| 2020年 / Ruhr-University of Bochum卷 / 2020期
基金
欧盟地平线“2020”;
关键词
Deep; Learning Side-Channel Analysis; Machine learning; Profiling Attacks;
D O I
10.13154/tches.v2020.i1.348-375
中图分类号
学科分类号
摘要
Recently, several studies have been published on the application of deep learning to enhance Side-Channel Attacks (SCA). These seminal works have practically validated the soundness of the approach, especially against implementations protected by masking or by jittering. Concurrently, important open issues have emerged. Among them, the relevance of machine (and thereby deep) learning based SCA has been questioned in several papers based on the lack of relation between the accuracy, a typical performance metric used in machine learning, and common SCA metrics like the Guessing entropy or the key-discrimination success rate. Also, the impact of the classical side-channel counter-measures on the efficiency of deep learning has been questioned, in particular by the semi-conductor industry. Both questions enlighten the importance of studying the theoretical soundness of deep learning in the context of side-channel and of developing means to quantify its efficiency, especially with respect to the optimality bounds published so far in the literature for side-channel leakage exploitation. The first main contribution of this paper directly concerns the latter point. It is indeed proved that minimizing the Negative Log Likelihood (NLL for short) loss function during the training of deep neural networks is actually asymptotically equivalent to maximizing the Perceived Information introduced by Renauld et al. at EUROCRYPT 2011 as a lower bound of the Mutual Information between the leakage and the target secret. Hence, such a training can be considered as an efficient and effective estimation of the PI, and thereby of the MI (known to be complex to accurately estimate in the context of secure implementations). As a second direct consequence of our main contribution, it is argued that, in a side-channel exploitation context, choosing the NLL loss function to drive the training is sound from an information theory point of view. As a third contribution, classical counter-measures like Boolean masking or execution flow shuffling, initially dedicated to classical SCA, are proved to stay sound against deep Learning based attacks. © 2020, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:348 / 375
页数:27
相关论文
共 50 条
  • [1] Side-channel analysis attacks based on deep learning network
    Yu Ou
    Lang Li
    Frontiers of Computer Science, 2022, 16
  • [2] Side-channel analysis attacks based on deep learning network
    OU Yu
    LI Lang
    Frontiers of Computer Science, 2022, 16 (02)
  • [3] Side-channel analysis attacks based on deep learning network
    Ou, Yu
    Li, Lang
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (02)
  • [4] Deep learning for side-channel analysis and introduction to ASCAD database
    Ryad Benadjila
    Emmanuel Prouff
    Rémi Strullu
    Eleonora Cagli
    Cécile Dumas
    Journal of Cryptographic Engineering, 2020, 10 : 163 - 188
  • [5] Deep learning for side-channel analysis and introduction to ASCAD database
    Benadjila, Ryad
    Prouff, Emmanuel
    Strullu, Remi
    Cagli, Eleonora
    Dumas, Cecile
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 163 - 188
  • [6] On the Evaluation of Deep Learning-Based Side-Channel Analysis
    Wu, Lichao
    Perin, Guilherme
    Picek, Stjepan
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2022, 2022, 13211 : 49 - 71
  • [7] Machine learning in side-channel analysis: a first study
    Hospodar, Gabriel
    Gierlichs, Benedikt
    De Mulder, Elke
    Verbauwhede, Ingrid
    Vandewalle, Joos
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) : 293 - 302
  • [8] Federated Learning in Side-Channel Analysis
    Wang, Huanyu
    Dubrova, Elena
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 257 - 272
  • [9] Label Correlation in Deep Learning-Based Side-Channel Analysis
    Wu, Lichao
    Weissbart, Leo
    Krcek, Marina
    Li, Huimin
    Perin, Guilherme
    Batina, Lejla
    Picek, Stjepan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3849 - 3861
  • [10] Deep Learning Method for Power Side-Channel Analysis on Chip Leakages
    Ahmed, Amjed Abbas
    Salim, Rana Ali
    Hasan, Mohammad Kamrul
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2023, 29 (06) : 50 - 57