Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional Datasets

被引:2
作者
Lei, Qi [1 ]
Yang, Zijia [1 ]
Wang, Qin [2 ]
Ding, Yaoling [3 ]
Ma, Zhe [1 ]
Wang, An [3 ]
机构
[1] Bank Card Test Ctr, Beijing, Peoples R China
[2] CSIRO Data61, Sydney, NSW, Australia
[3] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing, Peoples R China
来源
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2022 | 2022年 / 13407卷
关键词
Side-channel analysis; Deep learning; Autoencoder; SIDE-CHANNEL ANALYSIS;
D O I
10.1007/978-3-031-15777-6_18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep learning (DL)-based profiled attack has been proved to be a powerful tool in side-channel analysis. However, most attacks merely focus on small datasets, in which their points of interest are well-trimmed for attacks. Countermeasures applied in embedded systems always result in high-dimensional side-channel traces, i.e., the high-dimension of each input trace. These traces inevitably require complicated designs of neural networks and large sizes of trainable parameters for exploiting the correct keys. Therefore, performing profiled attacks (directly) on high-dimensional datasets is difficult. To bridge this gap, we propose a dimension reduction tool for high-dimensional traces by combining signal-to-noise ratio (SNR) analysis and autoencoder. With the designed asymmetric undercomplete autoencoder (UAE) architecture, we extract a small group of critical features from numerous time samples. The compression rate by using our UAE method reaches 40x on synchronized datasets and 30x on desynchronized datasets. This preprocessing step facilitates the profiled attacks by extracting potential leakage features. To demonstrate its effectiveness, we evaluate our proposed method on the raw ASCAD dataset with 100,000 samples in each trace. We also derive desynchronized datasets from the raw ASCAD dataset and validate our method under random delay effect. We further propose a 2(n)-structure MLP network as the attack model. By applying UAE and attack model on these traces, experimental results show all correct subkeys on synchronized datasets and desynchronized datasets are successfully revealed within hundreds of seconds. This indicates that our autoencoder can significantly facilitate DL-based profiled attacks on high-dimensional datasets.
引用
收藏
页码:324 / 341
页数:18
相关论文
共 26 条
[1]  
Archambeau C, 2006, LECT NOTES COMPUT SC, V4249, P1
[2]   Mutual Information Analysis: a Comprehensive Study [J].
Batina, Lejla ;
Gierlichs, Benedikt ;
Prouff, Emmanuel ;
Rivain, Matthieu ;
Standaert, Francois-Xavier ;
Veyrat-Charvillon, Nicolas .
JOURNAL OF CRYPTOLOGY, 2011, 24 (02) :269-291
[3]  
Bergstra J., 2011, P 2011 ANN C NEURAL, V24, DOI DOI 10.5555/2986459.2986743
[4]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[5]  
Cagli Eleonora, 2016, Smart Card Research and Advanced Applications. 14th International Conference, CARDIS 2015. Revised Selected Papers: LNCS 9514, P15, DOI 10.1007/978-3-319-31271-2_2
[6]   Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing [J].
Cagli, Eleonora ;
Dumas, Cecile ;
Prouff, Emmanuel .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 :45-68
[7]  
Carbone M., 2019, IACR T CRYPTOGR HARD, V2019, P132, DOI DOI 10.13154/TCHES.V2019.I2.132-161
[8]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[9]   Efficient Template Attacks [J].
Choudary, Omar ;
Kuhn, Markus G. .
SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 :253-270
[10]   Building a side channel based disassembler [J].
Eisenbarth T. ;
Paar C. ;
Weghenkel B. .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 6340 (PART 1) :78-99