Adaptive Chosen-Plaintext Deep-Learning-Based Side-Channel Analysis

被引:0
作者
Li, Yanbin [1 ,2 ,3 ]
Huang, Yuxin [4 ]
Guo, Yikang [4 ]
Ge, Chunpeng [1 ]
Kong, Fanyu [1 ]
Ren, Yongjun [5 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Henan Key Lab Network Cryptog Technol, Zhengzhou 450000, Peoples R China
[4] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing 210095, Peoples R China
[5] Nanjing Univ Informat Sci & Technol, Sch Comp, Nanjing 210044, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 01期
基金
中国国家自然科学基金;
关键词
Internet of Things; Cryptography; Analytical models; Sensitivity analysis; Entropy; Deep learning; Adaptation models; Chosen-plaintext (CP); deep learning; Internet of Things (IoT); side-channel analysis; POWER ANALYSIS;
D O I
10.1109/JIOT.2024.3460802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Profiled side-channel analysis presents a significant risk to embedded devices in Internet of Things (IoT). Typically, a single trace is insufficient to successfully key recovery in practical scenarios. It still requires several traces based on Bayes' posterior probability. In this article, we introduce a chosen-plaintext (CP) strategy into the deep learning-based profiled attacks to improve the attack efficiency. First, we present a general strategy to profile the leakage model by exploiting the sensitivity analysis and clustering analysis. The leakage model derived from deep neural network is to characterize the leakage of the target algorithm. Second, we propose an adaptive CP method in the deep learning-based attack, transforming the conditional probability distribution of the leakage into the entropy of the key candidates under the profiled leakage model. Finally, we evaluate the efficiency of the attack by practical measurements. The results demonstrate that the proposed method requires fewer traces to retrieve the key of AES on devices of different types, e.g., Smartcard, FPGA, and ARM. Moreover, our attack improves the attack efficiency on masked implementations.
引用
收藏
页码:174 / 185
页数:12
相关论文
共 50 条
  • [31] Multilabel Deep Learning-Based Side-Channel Attack
    Zhang, Libang
    Xing, Xinpeng
    Fan, Junfeng
    Wang, Zongyue
    Wang, Suying
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (06) : 1207 - 1216
  • [32] Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing
    Ding, Yaoling
    Shi, Ying
    Wang, An
    Zheng, Xuexin
    Wang, Zongyue
    Zhang, Guoshuang
    IEEE ACCESS, 2019, 7 : 63217 - 63229
  • [33] Deep learning-based classification and anomaly detection of side-channel signals
    Wang, Xiao
    Zhou, Quan
    Harer, Jacob
    Brown, Gavin
    Qiu, Shangran
    Dou, Zhi
    Wang, John
    Hinton, Alan
    Gonzalez, Carlos Aguayo
    Chin, Peter
    CYBER SENSING 2018, 2018, 10630
  • [34] A Comparison of Deep Learning Approaches for Power-Based Side-Channel Attacks
    Capoferri, Roberto
    Barenghi, Alessandro
    Breveglieri, Luca
    Izzo, Niccolo
    Pelosi, Gerardo
    SECURE IT SYSTEMS, NORDSEC 2024, 2025, 15396 : 101 - 120
  • [35] Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework
    Serafini, Gabriele
    Weissbart, Leo
    Batina, Lejla
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT I, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14586 : 195 - 212
  • [36] Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis
    Kerkhof, Maikel
    Wu, Lichao
    Perin, Guilherme
    Picek, Stjepan
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2022, 2022, 13211 : 29 - 48
  • [37] On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis
    Perin, Guilherme
    Picek, Stjepan
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 615 - 636
  • [38] BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis
    Zhang, Yezhou
    Li, Lang
    Ou, Yu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (01):
  • [39] DEEP LEARNING FOR MINIMAL-CONTEXT BLOCK TRACKING THROUGH SIDE-CHANNEL ANALYSIS
    Jensen, L.
    Brown, G.
    Wang, X.
    Harer, J.
    Chin, S.
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 3207 - 3211
  • [40] Machine learning in side-channel analysis: a first study
    Hospodar, Gabriel
    Gierlichs, Benedikt
    De Mulder, Elke
    Verbauwhede, Ingrid
    Vandewalle, Joos
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) : 293 - 302