AL-PA: Cross-Device Profiled Side-Channel Attack using Adversarial Learning

被引:11
作者
Cao, Pei [1 ]
Zhang, Hongyi [1 ]
Gu, Dawu [1 ]
Lu, Yan [2 ]
Yuan, Yidong [3 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
[2] State Grid Liaoning Elect Power Co Ltd, Shenyang, Liaoning, Peoples R China
[3] Beijing Smartchip Microelect Technol Co Ltd, Beijing, Peoples R China
来源
PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022 | 2022年
基金
中国国家自然科学基金;
关键词
side-channel attack; cross-device attack; transfer learning; adversarial networks;
D O I
10.1145/3489517.3530517
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we focus on the portability issue in profiled side-channel attacks (SCAs) that arises due to significant device-to-device variations. Device discrepancy is inevitable in realistic attacks, but it is often neglected in research works. In this paper, we identify such device variations and take a further step towards leveraging the transferability of neural networks. We propose a novel adversarial learning-based profiled attack (AL-PA), which enables our neural network to learn device-invariant features. We evaluated our strategy on eight XMEGA microcontrollers. Without the need for target-specific preprocessing and multiple profiling devices, our approach has outperformed the state-of-the-art methods.
引用
收藏
页码:691 / 696
页数:6
相关论文
共 27 条
[11]  
Genevey-Metat C., 2020, IACR Cryptol. ePrint Arch, P952
[12]   Practical Approaches Toward Deep-Learning-Based Cross-Device Power Side-Channel Attack [J].
Golder, Anupam ;
Das, Debayan ;
Danial, Josef ;
Ghosh, Santosh ;
Sen, Shreyas ;
Raychowdhury, Arijit .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (12) :2720-2733
[13]  
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
[14]  
Heuser Annelie, 2012, Constructive Side-Channel Analysis and Secure Design. Proceedings Third International Workshop, COSADE 2012, P249, DOI 10.1007/978-3-642-29912-4_18
[15]   Machine learning in side-channel analysis: a first study [J].
Hospodar, Gabriel ;
Gierlichs, Benedikt ;
De Mulder, Elke ;
Verbauwhede, Ingrid ;
Vandewalle, Joos .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) :293-302
[16]  
Kim J., 2019, IACR Transactions on Cryptographic Hardware and Embedded Systems, V2019, DOI [DOI 10.13154/TCHES.V2019.I3.148-179, 10.13154/tches.v2019.i3.148-179, DOI 10.46586/TCHES.V2019.I3.148-179]
[17]  
Lerman Liran, 2014, International Journal of Applied Cryptography, V3, P97, DOI 10.1504/IJACT.2014.062722
[18]  
Long MS, 2018, ADV NEUR IN, V31
[19]  
Maghrebi Houssem, 2016, Security, Privacy and Applied Cryptography Engineering. 6th International Conference, SPACE 2016. Proceedings: LNCS 10076, P3, DOI 10.1007/978-3-319-49445-6_1
[20]   Improving cross-device attacks using zero- mean unit-variance normalization [J].
Montminy, David P. ;
Baldwin, Rusty O. ;
Temple, Michael A. ;
Laspe, Eric D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :99-110