From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices

被引:11
作者
Zhang, Fan [1 ,2 ]
Shao, Bin [1 ]
Xu, Guorui [1 ]
Yang, Bolin [1 ]
Yang, Ziqi [3 ]
Qin, Zhan [1 ,2 ]
Ren, Kui [1 ,2 ]
机构
[1] Zhejiang Univ, Hangzhou, Peoples R China
[2] Alibaba Zhejiang Univ Joint Inst Frontier Technol, Hangzhou, Peoples R China
[3] Natl Univ Singapore, Singapore, Singapore
来源
PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) | 2020年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/dac18072.2020.9218693
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we raise practical situations in profiling based power analysis when profiling and target devices are quite different at several levels. "Crossed devices" are newly termed, including homogeneous and heterogeneous devices, which have not been carefully investigated. We identify such device variations and take a further step towards leveraging the deep learning based power analysis. Traditional template attacks and straight-forward deep learning based power analysis will fail, when the gap across devices is significantly enlarged. In this paper, we propose a noval frequency and learning based power analysis machanism, which is able to explore new attacking power of deep learning and address challenges caused by device variations. For the first time, power traces collected from our own PIC devices can be utilized to successfully attack the public dataset in DPAContest v4 which is based on a totally different AVR microcontroller.
引用
收藏
页数:6
相关论文
共 24 条
[1]  
[Anonymous], 2017, P INT C LEARN REPR
[2]  
Archambeau C, 2006, LECT NOTES COMPUT SC, V4249, P1
[3]  
Benadjila R., 2018, IACR CRYPTOLOGY EPRI
[4]  
Bhasin S., 2019, IACR CRYPTOLOGY EPRI
[5]   Integrating structured biological data by Kernel Maximum Mean Discrepancy [J].
Borgwardt, Karsten M. ;
Gretton, Arthur ;
Rasch, Malte J. ;
Kriegel, Hans-Peter ;
Schoelkopf, Bernhard ;
Smola, Alex J. .
BIOINFORMATICS, 2006, 22 (14) :E49-E57
[6]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[7]   Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing [J].
Cagli, Eleonora ;
Dumas, Cecile ;
Prouff, Emmanuel .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 :45-68
[8]  
Carbone M., 2019, IACR T CRYPTOGR HARD, V3, P132, DOI DOI 10.13154/TCHES.V2019.I2.132-161
[9]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[10]   Efficient, Portable Template Attacks [J].
Choudary, Marios O. ;
Kuhn, Markus G. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (02) :490-501