X-DeepSCA: Cross-Device Deep Learning Side Channel Attack

被引:82
作者
Das, Debayan [1 ]
Golder, Anupam [2 ]
Danial, Josef [1 ]
Ghosh, Santosh [3 ]
Raychowdhury, Arijit [2 ]
Sen, Shreyas [1 ]
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
[2] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
[3] Intel Labs, Hillsboro, OR USA
来源
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) | 2019年
基金
美国国家科学基金会;
关键词
Side-channel Attacks; Profiling attacks; Cross-device Attack; Deep Learning; Neural Networks; POWER ANALYSIS;
D O I
10.1145/3316781.3317934
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel Attack (X-DeepSCA), achieving an accuracy of >99.9%, even in presence of significantly higher inter-device variations compared to the inter-key variations. Augmenting traces captured from multiple devices for training and with proper choice of hyper-parameters, the proposed 256-class Deep Neural Network (DNN) learns accurately from the power side-channel leakage of an AES-128 target encryption engine, and an N-trace (N <= 10) X-DeepSCA attack breaks different target devices within seconds compared to a few minutes for a correlational power analysis (CPA) attack, thereby increasing the threat surface for embedded devices significantly. Even for low SNR scenarios, the proposed X-DeepSCA attack achieves similar to 10x lower minimum traces to disclosure (MTD) compared to a traditional CPA.
引用
收藏
页数:6
相关论文
共 30 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
[Anonymous], SMART CARD RES ADV A
[3]  
[Anonymous], STELLAR GENERIC EM S
[4]  
[Anonymous], 2016, BREAKING CRYPTOGRAPH
[5]  
[Anonymous], BLACKHAT 2018
[6]  
[Anonymous], 2015, ARXIV150203167CS
[7]  
[Anonymous], EUROCRYPT 2011
[8]  
[Anonymous], CONVOLUTIONAL NEURAL
[9]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[10]  
Brumley D, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P1