Multi-label Deep Learning based Side Channel Attack

被引:0
作者
Zhang, Libang [1 ,2 ]
Xing, Xinpeng [1 ]
Fan, Junfeng [2 ]
Wang, Zongyue [2 ]
Wang, Suying [2 ]
机构
[1] Tsinghua Shenzhen Int Grad Sch, Shenzhen Key Lab Informat Sci & Technol, Shenzhen, Peoples R China
[2] Open Secur Res, Shenzhen, Peoples R China
来源
PROCEEDINGS OF THE 2019 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST) | 2019年
基金
中国国家自然科学基金;
关键词
side channel attack; multi-label classification; deep learning; ensemble learning;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel side channel attack method with multi-label deep learning is proposed, and it surpasses the state-of-the-art result in ASCAD benchmark dataset. Our experimental results show that an ingenious modification of the output layer of a neural network can bring several times improvement of attack performance than the original model, even dozens of times when dealing with unaligned traces. In fact, the masked AES implementation of ASCAD only requires about 150, 250 and 350 traces to break respectively, when traces are manually desynchronized with our multi-label classification model. Our model can be considered as an ensemble learning method using the integration of monobit models based on the independence assumption of bits in the intermediate value.
引用
收藏
页数:6
相关论文
共 27 条
[1]   On Pixel-Wise Explanations for Non-Linear Classifier Decisions by Layer-Wise Relevance Propagation [J].
Bach, Sebastian ;
Binder, Alexander ;
Montavon, Gregoire ;
Klauschen, Frederick ;
Mueller, Klaus-Robert ;
Samek, Wojciech .
PLOS ONE, 2015, 10 (07)
[2]  
Benadjila R., 2018, Study of deep learning techniques for side -channel analysis and introduction to ascad database, V22
[3]  
Breiman L, 1996, MACH LEARN, V24, P123, DOI 10.1023/A:1018054314350
[4]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[5]   Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing [J].
Cagli, Eleonora ;
Dumas, Cecile ;
Prouff, Emmanuel .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 :45-68
[6]   A decision-theoretic generalization of on-line learning and an application to boosting [J].
Freund, Y ;
Schapire, RE .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1997, 55 (01) :119-139
[7]  
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
[8]  
He H., 2012, P ADV NEUR INF PROC, V25, P1
[9]   Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery [J].
Hettwer, Benjamin ;
Gehrer, Stefan ;
Gueneysu, Tim .
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 :645-666
[10]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388