Multi-Leak Deep-Learning Side-Channel Analysis

被引:11
作者
Hu, Fanliang [1 ]
Wang, Huanyu [2 ]
Wang, Junnian [1 ]
机构
[1] Hunan Univ Sci & Technol, Sch Phys & Elect Sci, Xiangtan 411199, Hunan, Peoples R China
[2] KTH Royal Inst Technol, Sch EECS, S-11428 Stockholm, Sweden
基金
中国国家自然科学基金;
关键词
Mathematical models; Software; Side-channel attacks; Deep learning; Power demand; Neural networks; Feature extraction; AES; deep learning; multiple leakage; multi-input model; side-channel attacks;
D O I
10.1109/ACCESS.2022.3152831
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep Learning Side-Channel Attacks (DLSCAs) have become a realistic threat to implementations of cryptographic algorithms, such as Advanced Encryption Standard (AES). By utilizing deep-learning models to analyze side-channel measurements, the attacker is able to derive the secret key of the cryptographic algorithm. However, when traces have multiple leakage intervals for a specific attack point, the majority of existing works train neural networks on these traces directly, without a appropriate preprocess step for each leakage interval. This degenerates the quality of profiling traces due to the noise and non-primary components. In this paper, we first divide the multi-leaky traces into leakage intervals and train models on different intervals separately. Afterwards, we concatenate these neural networks to build the final network, which is called multi-input model. We test the proposed multi-input model on traces captured from STM32F3 microcontroller implementations of AES-128 and show a 2-fold improvement over the previous single-input attacks.
引用
收藏
页码:22610 / 22621
页数:12
相关论文
共 28 条
[1]   Deep learning for side-channel analysis and introduction to ASCAD database [J].
Benadjila, Ryad ;
Prouff, Emmanuel ;
Strullu, Remi ;
Cagli, Eleonora ;
Dumas, Cecile .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) :163-188
[2]  
Benesty J, 2009, SPRINGER TOP SIGN PR, V2, P37, DOI 10.1007/978-3-642-00296-0_5
[3]   Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing [J].
Cagli, Eleonora ;
Dumas, Cecile ;
Prouff, Emmanuel .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 :45-68
[4]  
Daemen J, 2001, DR DOBBS J, V26, P137
[5]   X-DeepSCA: Cross-Device Deep Learning Side Channel Attack [J].
Das, Debayan ;
Golder, Anupam ;
Danial, Josef ;
Ghosh, Santosh ;
Raychowdhury, Arijit ;
Sen, Shreyas .
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
[6]   From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces [J].
Durvaux, Francois ;
Standaert, Francois-Xavier .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 :240-262
[7]   Deep Multi-Modal Object Detection and Semantic Segmentation for Autonomous Driving: Datasets, Methods, and Challenges [J].
Feng, Di ;
Haase-Schutz, Christian ;
Rosenbaum, Lars ;
Hertlein, Heinz ;
Glaser, Claudius ;
Timm, Fabian ;
Wiesbeck, Werner ;
Dietmayer, Klaus .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (03) :1341-1360
[8]  
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
[9]  
Gao Y., 2018, P 55 ACM ESDA IEEE D, P1
[10]  
Kim J., 2019, IACR Transactions on Cryptographic Hardware and Embedded Systems, V2019, DOI [DOI 10.13154/TCHES.V2019.I3.148-179, 10.13154/tches.v2019.i3.148-179, DOI 10.46586/TCHES.V2019.I3.148-179]