Convolutional Neural Networks for Profiled Side-Channel Analysis

被引:5
作者
Hou, Shourong [1 ]
Zhou, Yujie [1 ]
Liu, Hongming [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, 800 Dongchuan Rd, Shanghai, Peoples R China
关键词
Side-channel analysis; deep learning; convolutional neural networks; DeepSCA; VECTOR MACHINE ALGORITHM;
D O I
10.13164/re.2019.0651
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recent studies have shown that deep learning algorithms are very effective for evaluating the security of embedded systems. The deep learning technique represented by Convolutional Neural Networks (CNNs) has proven to be a promising paradigm in the profiled side-channel analysis attacks. In this paper, we first proposed a novel CNNs architecture called DeepSCA. Considering that this work may be reproduced by other researchers, we conduct all experiments on the public ASCAD dataset, which provides electromagnetic traces of a masked 128-bit AES implementation. Our work confirms that DeepSCA significantly reduces the number of side-channel traces required to perform successful attacks on highly desynchronized datasets, which even outperforms the published optimized CNNs model. Additionally, we find that DeepSCA pre-trained from the synchronous traces works well in presence of desynchronization or jittering after a slight fine-tuning.
引用
收藏
页码:651 / 658
页数:8
相关论文
共 50 条
  • [31] On the Importance of Pooling Layer Tuning for Profiling Side-Channel Analysis
    Wu, Lichao
    Perin, Guilherme
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021, 2021, 12809 : 114 - 132
  • [32] Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis
    Yu, Honggang
    Wang, Shuo
    Shan, Haoqi
    Panoff, Maximillian
    Lee, Michael
    Yang, Kaichen
    Jin, Yier
    2023 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2023, : 144 - 154
  • [33] Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis
    Perin, Guilherme
    Buhan, Ileana
    Picek, Stjepan
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 : 53 - 81
  • [34] Exploration into the Explainability of Neural Network Models for Power Side-Channel Analysis
    Golder, Anupam
    Bhat, Ashwin
    Raychowdhury, Arijit
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 59 - 64
  • [35] Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis
    Perin G.
    Chmielewski Ł.
    Picek S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (04): : 337 - 364
  • [36] Deep K-TSVM: A Novel Profiled Power Side-Channel Attack on AES-128
    Ghandali, Soroor
    Ghandali, Samaneh
    Tehranipoor, Sara
    IEEE ACCESS, 2021, 9 : 136448 - 136458
  • [37] Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks
    Paguada, Servio
    Batina, Lejla
    Buhan, Ileana
    Armendariz, Igor
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2835 - 2847
  • [38] CDAE: Towards Empowering Denoising in Side-Channel Analysis
    Yang, Guang
    Li, Huizhong
    Ming, Jingdian
    Zhou, Yongbin
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 269 - 286
  • [39] Side-Channel Analysis of the TERO PUF
    Tebelmann, Lars
    Pehl, Michael
    Immler, Vincent
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 43 - 60
  • [40] Learning-based Side-Channel Analysis on PIPO
    Woo, Ji-Eun
    Han, Jaeseung
    Kim, Yeon-Jae
    Mun, Hye-Won
    Lim, Seonghyuck
    Lee, Tae-Ho
    An, Seong-Hyun
    Kim, Soo-Jin
    Han, Dong-Guk
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 308 - 321