Convolutional Neural Network Based Side-Channel Attacks with Customized Filters

被引:2
作者
Wei, Man [1 ,2 ,3 ]
Shi, Danping [1 ,2 ,3 ]
Sun, Siwei [1 ,2 ,3 ]
Wang, Peng [1 ,2 ,3 ]
Hu, Lei [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Data Assurance & Commun Secur Res Ctr, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019) | 2020年 / 11999卷
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Side-Channel Analysis; Machine Learning; Deep learning; Convolutional Neural Networks;
D O I
10.1007/978-3-030-41579-2_46
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning is progressively gaining attention as a powerful tool for conducting profiling side-channel attacks. In particular, convolutional neural network (CNN) is one of the mostly employed learning techniques in the context of side-channel analysis. The first layer of a standard CNN always performs a set of convolutions between the input and some finite impulse response filters. In this work, we substitute the standard filter by a customized filter borrowed from the domain of speaker recognition due to the resemblance between the power traces and speech signals. In contrast to standard filters, the new filter only depends on parameters with a clear physical meaning, where only low and high cutoff frequencies are learned from the training data. Experimental results obtained from public datasets show that the side-channel attacks based on CNNs equipped with this new filter are more effective and robust than attacks based on standard CNNs. The results of this work open new perspective and encourage further research on the effect of the filters of the CNN-based side-channel attacks.
引用
收藏
页码:799 / 813
页数:15
相关论文
共 33 条
  • [1] Abadi M., 2016, TENSORFLOW LARGE SCA
  • [2] Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
  • [3] [Anonymous], 2008, DATA MINING DECISION
  • [4] [Anonymous], 2010, P ICML 10 P 27 INT C
  • [5] [Anonymous], 2015, ABS151108458 CORR
  • [6] [Anonymous], 2018, INT C SELECTED AREAS
  • [7] ANSSI, ASCAD DAT
  • [8] Bartkewitz Timo, 2012, Smart Card Research and Advanced Applications. 11th International Conference (CARDIS 2012). Revised Selected Papers, P263, DOI 10.1007/978-3-642-37288-9_18
  • [9] Bishop C.M., 2006, Pattern Recognition and Machine Learning, DOI DOI 10.1007/978-0-387-45528-0
  • [10] Correlation power analysis with a leakage model
    Brier, E
    Clavier, C
    Olivier, F
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29