Label Correlation in Deep Learning-Based Side-Channel Analysis

被引:4
作者
Wu, Lichao [1 ]
Weissbart, Leo [1 ,2 ]
Krcek, Marina [1 ]
Li, Huimin [1 ]
Perin, Guilherme [1 ,2 ]
Batina, Lejla [2 ]
Picek, Stjepan [1 ,2 ]
机构
[1] Delft Univ Technol, Fac Elect Engn Math & Comp Sci, NL-2628 XE Delft, Netherlands
[2] Radboud Univ Nijmegen, Digital Secur Grp, NL-6525 EC Nijmegen, Netherlands
关键词
Side-channel analysis; profiling analysis; deep learning; label distribution; profiling model fitting;
D O I
10.1109/TIFS.2023.3287728
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The efficiency of the profiling side-channel analysis can be significantly improved with machine learning techniques. Although powerful, a fundamental machine learning limitation of being data-hungry received little attention in the side-channel community. In practice, the maximum number of leakage traces that evaluators/attackers can obtain is constrained by the scheme requirements or the limited accessibility of the target. Even worse, various countermeasures in modern devices increase the conditions on the profiling size to break the target. This work demonstrates a practical approach to dealing with the lack of profiling traces. Instead of learning from a one-hot encoded label, transferring the labels to their distribution can significantly speed up the convergence of guessing entropy. By studying the relationship between all possible key candidates, we propose a new metric, denoted Label Correlation (LC), to evaluate the generalization ability of the profiling model. We validate LC with two common use cases: early stopping and network architecture search, and the results indicate its superior performance.
引用
收藏
页码:3849 / 3861
页数:13
相关论文
共 50 条
  • [21] Controlling the Deep Learning-Based Side-Channel Analysis: A Way to Leverage from Heuristics
    Paguada, Servio
    Rioja, Unai
    Armendariz, Igor
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 106 - 125
  • [22] Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution
    Ito, Akira
    Saito, Kotaro
    Ueno, Rei
    Homma, Naofumi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3790 - 3802
  • [23] No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis
    Kerkhof, Maikel
    Wu, Lichao
    Perin, Guilherme
    Picek, Stjepan
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 13 (03) : 311 - 324
  • [24] No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis
    Maikel Kerkhof
    Lichao Wu
    Guilherme Perin
    Stjepan Picek
    Journal of Cryptographic Engineering, 2023, 13 : 311 - 324
  • [25] Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption Opportunities and Limitations
    Schmid, Fabian
    Mukherjee, Shibam
    Picek, Stjepan
    Stoettinger, Marc
    De Santis, Fabrizio
    Rechberger, Christian
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2024, 2024, 14595 : 133 - 154
  • [26] Effective Deep Learning-based Side-Channel Analyses Against ASCAD
    Liu, Junkai
    Zheng, Shihui
    Gu, Lize
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 514 - 523
  • [27] A Novel Side-Channel Archive Framework Using Deep Learning-Based Leakage Compression
    Jung, Sangyun
    Jin, Sunghyun
    Kim, Heeseok
    IEEE ACCESS, 2024, 12 : 105326 - 105336
  • [28] Non-Profiled Deep Learning-Based Side-Channel Preprocessing With Autoencoders
    Kwon, Donggeun
    Kim, Heeseok
    Hong, Seokhie
    IEEE ACCESS, 2021, 9 : 57692 - 57703
  • [29] Research on Side-Channel Analysis Based on Deep Learning with Different Sample Data
    Chang, Lipeng
    Wei, Yuechuan
    He, Shuiyu
    Pan, Xiaozhong
    APPLIED SCIENCES-BASEL, 2022, 12 (16):
  • [30] Deep learning for side-channel analysis and introduction to ASCAD database
    Ryad Benadjila
    Emmanuel Prouff
    Rémi Strullu
    Eleonora Cagli
    Cécile Dumas
    Journal of Cryptographic Engineering, 2020, 10 : 163 - 188