AL-PA: Cross-Device Profiled Side-Channel Attack using Adversarial Learning

被引:11
作者
Cao, Pei [1 ]
Zhang, Hongyi [1 ]
Gu, Dawu [1 ]
Lu, Yan [2 ]
Yuan, Yidong [3 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
[2] State Grid Liaoning Elect Power Co Ltd, Shenyang, Liaoning, Peoples R China
[3] Beijing Smartchip Microelect Technol Co Ltd, Beijing, Peoples R China
来源
PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022 | 2022年
基金
中国国家自然科学基金;
关键词
side-channel attack; cross-device attack; transfer learning; adversarial networks;
D O I
10.1145/3489517.3530517
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we focus on the portability issue in profiled side-channel attacks (SCAs) that arises due to significant device-to-device variations. Device discrepancy is inevitable in realistic attacks, but it is often neglected in research works. In this paper, we identify such device variations and take a further step towards leveraging the transferability of neural networks. We propose a novel adversarial learning-based profiled attack (AL-PA), which enables our neural network to learn device-invariant features. We evaluated our strategy on eight XMEGA microcontrollers. Without the need for target-specific preprocessing and multiple profiling devices, our approach has outperformed the state-of-the-art methods.
引用
收藏
页码:691 / 696
页数:6
相关论文
共 27 条
[1]  
Bartkewitz Timo, 2012, Smart Card Research and Advanced Applications. 11th International Conference (CARDIS 2012). Revised Selected Papers, P263, DOI 10.1007/978-3-642-37288-9_18
[2]   Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis [J].
Bhasin, Shivam ;
Chattopadhyay, Anupam ;
Heuser, Annelie ;
Jap, Dirmanto ;
Picek, Stjepan ;
Shrivastwa, Ritu Ranjan .
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
[3]  
Bhasin S, 2014, IEEE INT SYMP ELEC, P310
[4]   Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing [J].
Cagli, Eleonora ;
Dumas, Cecile ;
Prouff, Emmanuel .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 :45-68
[5]  
Cao P., 2021, IACR Transactions on Cryptographic Hardware and Embedded Systems, V2021, P27, DOI [10.46586/tches.v2021.i4.27-56, DOI 10.46586/TCHES.V2021.I4.27-56]
[6]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[7]   Efficient, Portable Template Attacks [J].
Choudary, Marios O. ;
Kuhn, Markus G. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (02) :490-501
[8]   Template Attacks on Different Devices [J].
Choudary, Omar ;
Kuhn, Markus G. .
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2014, 8622 :179-198
[9]   X-DeepSCA: Cross-Device Deep Learning Side Channel Attack [J].
Das, Debayan ;
Golder, Anupam ;
Danial, Josef ;
Ghosh, Santosh ;
Raychowdhury, Arijit ;
Sen, Shreyas .
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
[10]   Portability of templates [J].
Elaabid, M. Abdelaziz ;
Guilley, Sylvain .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (01) :63-74