Multi-Dimensional Fusion Deep Learning for Side Channel Analysis

被引:2
作者
Deng, Tuo [1 ,2 ]
Wang, Huanyu [3 ]
He, Dalin [1 ,2 ]
Xiong, Naixue [3 ]
Liang, Wei [3 ]
Wang, Junnian [1 ,2 ]
机构
[1] Hunan Univ Sci & Technol, Sch Phys & Elect Sci, Xiangtan 411201, Peoples R China
[2] Hunan Prov Key Lab Intelligent Sensors & Adv Sensi, Xiangtan 411201, Peoples R China
[3] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
基金
中国国家自然科学基金;
关键词
side-channel attacks; deep learning; multi-scale feature fusion; network fusion; AES-128;
D O I
10.3390/electronics12234728
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid advancement of deep learning has significantly heightened the threats posed by Side-Channel Attacks (SCAs) to information security, transforming their effectiveness to a degree several orders of magnitude superior to conventional signal processing techniques. However, the majority of existing Deep-Learning Side-Channel Attacks (DLSCAs) primarily focus on the classification accuracy of the trained model at the attack stage, often assuming that adversaries have unlimited computational and time resources during the profiling stage. This might result in an inflated assessment of the trained model's fitting capability in a real attack scenario. In this paper, we present a novel DLSCA model, called a Multi-Dimensional Fusion Convolutional Residual Dendrite (MD_CResDD) network, to enhance and speed up the feature extraction process by incorporating a multi-scale feature fusion mechanism. By testing the proposed model on two software implementations of AES-128, we show that it is feasible to improve the profiling speed by at least 34% compared to other existing deep-learning models for DLSCAs and meanwhile achieved a certain level of improvement (8.4% and 0.8% for two implementations) in the attack accuracy. Furthermore, we also investigate how different fusion approaches, fusion times, and residual blocks can affect the attack efficiency on the same two datasets.
引用
收藏
页数:16
相关论文
共 26 条
[1]   Deep learning for side-channel analysis and introduction to ASCAD database [J].
Benadjila, Ryad ;
Prouff, Emmanuel ;
Strullu, Remi ;
Cagli, Eleonora ;
Dumas, Cecile .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) :163-188
[2]   Generalized Hamming distance [J].
Bookstein, A ;
Kulyukin, VA ;
Raita, T .
INFORMATION RETRIEVAL, 2002, 5 (04) :353-375
[3]   Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing [J].
Cagli, Eleonora ;
Dumas, Cecile ;
Prouff, Emmanuel .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 :45-68
[4]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[5]   A simulated approach to evaluate side-channel attack countermeasures for the Advanced Encryption Standard [J].
Crocetti, Luca ;
Baldanzi, Luca ;
Bertolucci, Matteo ;
Sarti, Luca ;
Carnevale, Berardino ;
Fanucci, Luca .
INTEGRATION-THE VLSI JOURNAL, 2019, 68 :80-86
[6]  
Daemen Joan, 2002, Information Security and Cryptography
[7]   X-DeepSCA: Cross-Device Deep Learning Side Channel Attack [J].
Das, Debayan ;
Golder, Anupam ;
Danial, Josef ;
Ghosh, Santosh ;
Raychowdhury, Arijit ;
Sen, Shreyas .
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
[8]   Dendritic action potentials and computation in human layer 2/3 cortical neurons [J].
Gidon, Albert ;
Zolnik, Timothy Adam ;
Fidzinski, Pawel ;
Bolduan, Felix ;
Papoutsi, Athanasia ;
Poirazi, Panayiota ;
Holtkamp, Martin ;
Vida, Imre ;
Larkum, Matthew Evan .
SCIENCE, 2020, 367 (6473) :83-+
[9]  
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
[10]   MDFC-ResNet: An Agricultural IoT System to Accurately Recognize Crop Diseases [J].
Hu, Wei-Jian ;
Fan, Jie ;
Du, Yong-Xing ;
Li, Bao-Shan ;
Xiong, Naixue ;
Bekkering, Ernst .
IEEE ACCESS, 2020, 8 :115287-115298