Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis

被引:10
作者
Perin, Guilherme [1 ]
Buhan, Ileana [2 ]
Picek, Stjepan [1 ]
机构
[1] Delft Univ Technol, Delft, Netherlands
[2] Radboud Univ Nijmegen, Nijmegen, Netherlands
来源
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021 | 2021年 / 12910卷
关键词
Side-channel analysis; Neural networks; Overfitting; Mutual information; Information bottleneck;
D O I
10.1007/978-3-030-89915-8_3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Today, deep neural networks are a common choice for conducting the profiled side-channel analysis. Unfortunately, it is not trivial to find neural network hyperparameters that would result in top-performing attacks. The hyperparameter leading the training process is the number of epochs during which the training happens. If the training is too short, the network does not reach its full capacity, while if the training is too long, the network overfits and cannot generalize to unseen examples. In this paper, we tackle the problem of determining the correct epoch to stop the training in the deep learning-based side-channel analysis. We demonstrate that the amount of information, or, more precisely, mutual information transferred to the output layer, can be measured and used as a reference metric to determine the epoch at which the network offers optimal generalization. To validate the proposed methodology, we provide extensive experimental results.
引用
收藏
页码:53 / 81
页数:29
相关论文
共 28 条
  • [1] Amjad R.A, 2018, ABS180209766 CORR
  • [2] [Anonymous], 2019, ARXIV190209037
  • [3] Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
    Bronchain, Olivier
    Hendrickx, Julien M.
    Massart, Clement
    Olshevsky, Alex
    Standaert, Francois-Xavier
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 : 713 - 737
  • [4] Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
    Cagli, Eleonora
    Dumas, Cecile
    Prouff, Emmanuel
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 45 - 68
  • [5] Dougherty J., 1995, Machine Learning. Proceedings of the Twelfth International Conference on Machine Learning, P194
  • [6] Hettwer Benjamin, 2019, Selected Areas in Cryptography - SAC 2018. 25th International Conference. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11349), P479, DOI 10.1007/978-3-030-10970-7_22
  • [7] Kim J., 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst., P148, DOI [DOI 10.46586/TCHES.V2019.I3.148-179, DOI 10.13154/TCHES.V2019.I3.148-179]
  • [8] Kraskov A, 2004, PHYS REV E, V69, DOI 10.1103/PhysRevE.69.066138
  • [9] Maghrebi Houssem, 2016, Security, Privacy and Applied Cryptography Engineering. 6th International Conference, SPACE 2016. Proceedings: LNCS 10076, P3, DOI 10.1007/978-3-319-49445-6_1
  • [10] Masure L., 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst., V2020, P348