Efficient Side-Channel Data Compression Using Autoencoder Networks for Enhanced Leakage Analysis

被引:0
作者
Yan, Mingkai [1 ]
Zhang, Lixiong [2 ]
Li, Yujia [1 ]
Wu, Hanbing [2 ]
Li, Yuran [2 ]
机构
[1] CATARC Software Testing Tianjin Co Ltd, Tianjin, Peoples R China
[2] China Automot Technol & Res Ctr Co Ltd, Tianjin, Peoples R China
来源
2024 IEEE 7TH INTERNATIONAL CONFERENCE ON AUTOMATION, ELECTRONICS AND ELECTRICAL ENGINEERING, AUTEEE | 2024年
关键词
Side Channel Analysis; Data Compression; Autoencoder; Security Chip;
D O I
10.1109/AUTEEE62881.2024.10869741
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel data compression techniques are designed to reduce the dimensionality of input data while preserving critical information, thereby improving the efficiency of side-channel analysis. Traditional methods of side-channel analysis can be broadly classified into two categories: peak extraction techniques and data integration techniques, based on the scale and principles of the input data. In this study, we present a novel side-channel data compression technique utilizing convolutional autoencoder networks. We apply this method to power-side channel data collected from an SM4 encryption circuit implemented on a secure chip. Experimental results show that our proposed technique surpasses conventional methods in Test Vector Leakage Assessment (TVLA) analysis and achieves a 35% improvement in efficiency in Measurements to Disclosure (MTD) analysis, while maintaining the same compression rate. These results underscore the effectiveness and potential of our approach in enhancing side-channel analysis.
引用
收藏
页码:304 / 308
页数:5
相关论文
共 10 条
[1]  
Batina L, 2012, LECT NOTES COMPUT SC, V7178, P383, DOI 10.1007/978-3-642-27954-6_24
[2]   Efficient Side-Channel Attack through Balanced Labels Compression and Variational Autoencoder [J].
Cai, Nengfu ;
Yang, Zhigin ;
Wang, Shuhai ;
Jiang, Yanling ;
Liu, Mingsheng ;
Li, Gang .
2023 19TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN 2023, 2023, :480-487
[3]  
[谷大武 Gu Dawu], 2021, [西安电子科技大学学报, Journal of Xidian University], V48, P14
[4]  
Hu F, 2023, IEEE Transactions on Information Forensics and Security, P19
[5]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[6]  
KWON D, 2020, IACR Cryptology ePrint Archive, p2020/396
[7]  
Oswald M., 2007, Power Analysis Attacks: Revealing the Secrets of Smart Cards, DOI [10.1007/978-0-387-38162-6, DOI 10.1007/978-0-387-38162-6]
[8]  
Picek S., 2020, CHES, P389
[9]  
Tiri K, 2005, LECT NOTES COMPUT SC, V3659, P354
[10]  
XIAO Chong, 2024, Chinese Journal of Computers, P1