Side-channel analysis based on Siamese neural network

被引:1
作者
Li, Di [1 ,2 ]
Li, Lang [1 ,2 ]
Ou, Yu [1 ,2 ]
机构
[1] Hengyang Normal Univ, Coll Comp Sci & Technol, Hengyang 421002, Peoples R China
[2] Hunan Prov Key Lab Intelligent Informat Proc & App, Hengyang 421002, Peoples R China
关键词
Side-channel analysis; Deep learning; Siamese neural network; Information security; ARTIFICIAL-INTELLIGENCE; ATTACKS;
D O I
10.1007/s11227-023-05631-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the combination of deep learning and side-channel analysis has received extensive attention. Previous research has shown that the key recovery problem can be transformed into a classification problem. The performance of these models strongly depends on the size of the dataset and the number of instances in each target class. The training time is very long. In this paper, the key recovery problem is transformed into a similarity measurement problem in Siamese neural networks. We use simulated power traces and true power traces to form power pairs to augment data and simplify key recovery steps. The trace pairs are selected based on labels and added to the training to improve model performance. The model adopts a Siamese, CNN-based architecture, and it can evaluate the similarity between the inputs. The correct key is revealed by the similarity of different trace pairs. In experiments, three datasets are used to evaluate our method. The results show that the proposed method can be successfully trained with 1000 power traces and has excellent attack efficiency and training speed.
引用
收藏
页码:4423 / 4450
页数:28
相关论文
共 50 条
  • [41] Research on Side-Channel Analysis Based on Deep Learning with Different Sample Data
    Chang, Lipeng
    Wei, Yuechuan
    He, Shuiyu
    Pan, Xiaozhong
    APPLIED SCIENCES-BASEL, 2022, 12 (16):
  • [42] SCAUL: Power Side-Channel Analysis With Unsupervised Learning
    Ramezanpour, Keyvan
    Ampadu, Paul
    Diehl, William
    IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (11) : 1626 - 1638
  • [43] Improving Efficiency of Key Enumeration Based on Side-Channel Analysis
    Yang, Wei
    Fu, Anmin
    Zhang, Hailong
    Huang, Chanying
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 54 - 61
  • [44] Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis
    van der Valk, Daan
    Picek, Stjepan
    Bhasin, Shivam
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 175 - 199
  • [45] A Hardware Trojan Detection Method Based on Side-channel Analysis
    Wang Xiaohan
    Li Xiongwei
    Xu Lu
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1042 - 1047
  • [46] Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    Chevallier-Mames, B
    Ciet, M
    Joye, M
    IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (06) : 760 - 768
  • [47] Quantitative estimation of side-channel leaks with neural networks
    Saeid Tizpaz-Niari
    Pavol Černý
    Sriram Sankaranarayanan
    Ashutosh Trivedi
    International Journal on Software Tools for Technology Transfer, 2021, 23 : 641 - 654
  • [48] Side-channel attacks on convolutional neural networks based on the hybrid attention mechanism
    Tao Feng
    Huan Gao
    Xiaomin Li
    Chunyan Liu
    Discover Applied Sciences, 7 (5)
  • [49] Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes
    Ueno, Rei
    Fukushima, Kazuhide
    Nakano, Yuto
    Kiyomoto, Shinsaku
    Homma, Naofumi
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 43 - 67
  • [50] On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis
    Hajra, Suvadeep
    Alam, Manaar
    Saha, Sayandeep
    Picek, Stjepan
    Mukhopadhyay, Debdeep
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 514 - 528