DEEP LEARNING FOR MINIMAL-CONTEXT BLOCK TRACKING THROUGH SIDE-CHANNEL ANALYSIS

被引:0
作者
Jensen, L. [1 ]
Brown, G. [1 ]
Wang, X. [1 ]
Harer, J. [1 ]
Chin, S. [1 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
来源
2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP) | 2019年
关键词
block tracking; side-channel analysis; machine learning; deep learning;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
It is well known that electromagnetic and power side-channel attacks allow extraction of unintended information from a computer processor. However, little work has been done to quantify how small a sample is needed in order to glean meaningful information about a program's execution. This paper quantifies this minimum context by training a deep-learning model to track and classify program block types given small windows of side-channel data. We show that a window containing approximately four clock cycles suffices to predict block type with our experimental setup. This implies a high degree of information leakage through side channels, allowing for the external monitoring of embedded systems and Internet of Things devices.
引用
收藏
页码:3207 / 3211
页数:5
相关论文
共 21 条
  • [1] Agrawal Dakshi, 2003, SIDE CHANNELS ATTACK
  • [2] Callan Robert, 2014, 2014 47 ANN IEEE ACM
  • [3] Cho K., 2014, P SSST8 8 WORKSH SYN, P103, DOI 10.3115/v1/w14-4012
  • [4] Chollet F., 2015, Keras
  • [5] Clevert D.-A., 2016, 4 INT C LEARN REPR I
  • [6] Genkin D., 2013, IACR Cryptology ePrint Archive, P857
  • [7] Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
  • [8] Machine learning in side-channel analysis: a first study
    Hospodar, Gabriel
    Gierlichs, Benedikt
    De Mulder, Elke
    Verbauwhede, Ingrid
    Vandewalle, Joos
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) : 293 - 302
  • [9] Hutter M., 2014, IACR CRYPTOLOGY EPRI, V2014, P190
  • [10] Ioffe S, 2015, 32 INT C MACH LEARN