EM-X-DL: Efficient Cross-device Deep Learning Side-channel Attack With Noisy EM Signatures

被引:21
作者
Danial, Josef [1 ]
Das, Debayan [1 ]
Golder, Anupam [2 ]
Ghosh, Santosh [3 ]
Raychowdhury, Arijit [2 ]
Sen, Shreyas [1 ]
机构
[1] Purdue Univ, W Lafayette, IN USA
[2] Georgia Inst Technol, Atlanta, GA USA
[3] Intel Corp, Hillsboro, OR USA
基金
美国国家科学基金会;
关键词
Electromagnetic side-channel attacks; cross-device attack; deep learning; profiling attacks; end-to-end SCA;
D O I
10.1145/3465380
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a Cross-device Deep-Learning based Electromagnetic (EM-X-DL) side-channel analysis (SCA) on AES-128, in the presence of a significantly lower signal-to-noise ratio (SNR) compared to previous works. Using a novel algorithm to intelligently select multiple training devices and proper choice of hyperparameters, the proposed 256-class deep neural network (DNN) can be trained efficiently utilizing pre-processing techniques like PCA, LDA, and FFT on measurements from the target encryption engine running on an 8-bit Atmel microcontroller. In this way, EM-X-DL achieves >90% single-trace attack accuracy. Finally, an efficient end-to-end SCA leakage detection and attack framework using EM-X-DL demonstrates high confidence of an attacker with <20 averaged EM traces.
引用
收藏
页数:17
相关论文
共 36 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
[3]  
Bartkewitz T, 2013, SMART CARD RES ADV A
[4]  
Benadjila R., 2018, Study of deep learning techniques for side-channel analysis and introduction to ASCAD database
[5]  
Bhasin S., 2019, Mind the portability: A warriors guide through realistic profiled side-channel analysis
[6]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[7]   Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing [J].
Cagli, Eleonora ;
Dumas, Cecile ;
Prouff, Emmanuel .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 :45-68
[8]  
Carbone M., 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst., V2019, P132, DOI DOI 10.13154/TCHES.V2019.I2.132-161
[9]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[10]   Efficient, Portable Template Attacks [J].
Choudary, Marios O. ;
Kuhn, Markus G. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (02) :490-501