Practical Approaches Toward Deep-Learning-Based Cross-Device Power Side-Channel Attack

被引:39
作者
Golder, Anupam [1 ]
Das, Debayan [2 ]
Danial, Josef [2 ]
Ghosh, Santosh [3 ]
Sen, Shreyas [2 ]
Raychowdhury, Arijit [1 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
[2] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
[3] Intel Corp, Intel Labs, Hillsboro, OR 97124 USA
基金
美国国家科学基金会;
关键词
Cross-device attacks; deep learning; dynamic time warping (DTW); principal component analysis (PCA); profiling attacks; side-channel analysis (SCA); TEMPLATE ATTACKS; OPTIMIZATION;
D O I
10.1109/TVLSI.2019.2926324
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Power side-channel analysis (SCA) has been of immense interest to most embedded designers to evaluate the physical security of the system. This work presents profilingbased cross-device power SCA attacks using deep-learning techniques on 8-bit AVR microcontroller devices running AES-128. First, we show the practical issues that arise in these profiling-based cross-device attacks due to significant device-to-device variations. Second, we show that utilizing principal component analysis (PCA)-based preprocessing and multidevice training, a multilayer perceptron (MLP)-based 256-class classifier can achieve an average accuracy of 99.43% in recovering the first keybyte from all the 30 devices in our data set, even in the presence of significant interdevice variations. Results show that the designed MLP with PCA-based preprocessing outperforms a convolutional neural network (CNN) with four-device training by similar to 20% in terms of the average test accuracy of cross-device attack for the aligned traces captured using the ChipWhisperer hardware. Finally, to extend the practicality of these crossdevice attacks, another preprocessing step, namely, dynamic time warping (DTW) has been utilized to remove any misalignment among the traces, before performing PCA. DTW along with PCA followed by the 256-class MLP classifier provides >= 10.97% higher accuracy than the CNN-based approach for cross-device attack even in the presence of up to 50 time-sample misalignments between the traces.
引用
收藏
页码:2720 / 2733
页数:14
相关论文
共 51 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
[3]   RIJID: Random code injection to mask power analysis based side channel attacks [J].
Ambrose, Jude Angelo ;
Ragel, Roshan G. ;
Parameswaran, Sri .
2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, :489-+
[4]  
[Anonymous], 2014, 2014 IEEE WORKSH SIG
[5]  
[Anonymous], P 3 INT C LEARNING R
[6]  
[Anonymous], 2019, P 56 ANN DES AUT C
[7]  
[Anonymous], DPA CONT 2013 2014
[8]  
[Anonymous], ACM T INF SYST SECUR
[9]  
[Anonymous], INT ENCY STAT SCI
[10]  
[Anonymous], 2018053 CRYPT EPRINT