A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces

被引:0
|
作者
Ninan, Mabon [1 ]
Nimmo, Evan [1 ]
Reilly, Shane [1 ]
Smith, Channing [1 ,2 ]
Sun, Wenhai [3 ]
Wang, Boyang [1 ]
Emmert, John M. [1 ]
机构
[1] Univ Cincinnati, Cincinnati, OH 45221 USA
[2] Coll Charleston, Charleston, SC 29401 USA
[3] Purdue Univ, W Lafayette, IN 47907 USA
来源
PROCEEDINGS OF 27TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2024 | 2024年
基金
美国国家科学基金会;
关键词
Side-channel analysis; deep learning;
D O I
10.1145/3678890.3678900
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning side-channel attacks can recover encryption keys on a target by analyzing power consumption or electromagnetic (EM) signals. However, they are less portable when there are domain shifts between training and test data. While existing studies have shown that pre-processing and unsupervised domain adaptation can enhance the portability of deep learning side-channel attacks given domain shifts over EM traces, the findings are limited to easy targets (e.g. 8-bit microcontrollers). In this paper, we investigate the portability of deep learning side-channel attacks over EM traces acquired from more challenging targets, including 32-bit microcontrollers and EM traces with random delay. We study domain shifts introduced by the combination of hardware variations, distinct keys, and inconsistent probe locations between two targets. In addition, we perform comparative analyses of multiple existing (and new) pre-processing and unsupervised domain adaptation methods. We conduct a series of comprehensive experiments and derive three main observations. (1) Pre-processing and unsupervised domain adaptation methods can enhance the portability of deep learning side-channel attacks over more challenging targets. (2) The effectiveness of each method, however, varies depending on the target and probe locations in use. In other words, observations of a method on easy targets do not necessarily generalize to challenging targets. (3) None of the methods can constantly outperform others. Moreover, we highlight two types of pitfalls that could lead to over-optimistic attack results in cross-device evaluations. We also contribute a large-scale public dataset (with 3 million EM traces from 9 probe locations over multiple targets) for benchmarking and reproducibility of side-channel attacks tackling domain shifts over EM traces.
引用
收藏
页码:630 / 643
页数:14
相关论文
共 50 条
  • [1] TripletPower: Deep-Learning Side-Channel Attacks over Few Traces
    Wang, Chenggang
    Dani, Jimmy
    Reilly, Shane
    Brownfield, Austen
    Wang, Boyang
    Emmert, John M.
    2023 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2023, : 167 - 178
  • [2] Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies
    Wang, Chenggang
    Ninan, Mabon
    Reilly, Shane
    Ward, Joel
    Hawkins, William
    Wang, Boyang
    Emmert, John M.
    PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, 2023, : 227 - 238
  • [3] Potential of Unsupervised Deep Learning for Detection of EM Side-Channel Attacks
    Ghimire, Ashutosh
    Singh, Harshdeep
    Bhatta, Niraj Prasad
    Amsaad, Fathi
    2023 IEEE PHYSICAL ASSURANCE AND INSPECTION OF ELECTRONICS, PAINE, 2023, : 60 - 65
  • [4] Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber
    Chen, Peng
    Cheng, Chi
    Li, Jinnuo
    Zhu, Tianqing
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 151 - 167
  • [5] Side-channel analysis attacks based on deep learning network
    OU Yu
    LI Lang
    Frontiers of Computer Science, 2022, 16 (02)
  • [6] Side-channel analysis attacks based on deep learning network
    Yu Ou
    Lang Li
    Frontiers of Computer Science, 2022, 16
  • [7] Side-channel analysis attacks based on deep learning network
    Ou, Yu
    Li, Lang
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (02)
  • [8] Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
    Zhou, Yuanyuan
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 85 - 95
  • [9] Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
    Yuanyuan Zhou
    François-Xavier Standaert
    Journal of Cryptographic Engineering, 2020, 10 : 85 - 95
  • [10] How Diversity Affects Deep-Learning Side-Channel Attacks
    Wang, Huanyu
    Brisfors, Martin
    Forsmark, Sebastian
    Dubrova, Elena
    2019 IEEE NORDIC CIRCUITS AND SYSTEMS CONFERENCE (NORCAS) - NORCHIP AND INTERNATIONAL SYMPOSIUM OF SYSTEM-ON-CHIP (SOC), 2019,