On the Evaluation of Deep Learning-Based Side-Channel Analysis

被引:5
作者
Wu, Lichao [1 ]
Perin, Guilherme [1 ]
Picek, Stjepan [1 ,2 ]
机构
[1] Delft Univ Technol, Delft, Netherlands
[2] Radboud Univ Nijmegen, Nijmegen, Netherlands
来源
CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2022 | 2022年 / 13211卷
关键词
Side-channel Analysis; Deep Learning; Guessing Entropy; Median;
D O I
10.1007/978-3-030-99766-3_3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning-based side-channel analysis is rapidly positioning itself as a de-facto standard for the most powerful profiling side-channel analysis.The results from the last few years show that deep learning techniques can efficiently break targets that are even protected with countermeasures. While there are constant improvements in making the deep learning-based attacks more powerful, little is done on evaluating the attacks' performance. Indeed, how the evaluation process is done today is not different from what was done more than a decade ago from the perspective of evaluation metrics. This paper considers how to evaluate deep learning-based side-channel analysis and whether the commonly used approaches give the best results. To that end, we consider different summary statistics and the influence of algorithmic randomness on the stability of profiling models. Our results show that besides commonly used metrics like guessing entropy, one should also show the standard deviation results to assess the attack performance properly. Even more importantly, using the arithmetic mean for guessing entropy does not yield the best results, and instead, a median value should be used.
引用
收藏
页码:49 / 71
页数:23
相关论文
共 30 条
  • [1] Deep learning for side-channel analysis and introduction to ASCAD database
    Benadjila, Ryad
    Prouff, Emmanuel
    Strullu, Remi
    Cagli, Eleonora
    Dumas, Cecile
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 163 - 188
  • [2] Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis
    Bhasin, Shivam
    Chattopadhyay, Anupam
    Heuser, Annelie
    Jap, Dirmanto
    Picek, Stjepan
    Shrivastwa, Ritu Ranjan
    [J]. 27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [3] Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing
    Cagli, Eleonora
    Dumas, Cecile
    Prouff, Emmanuel
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 45 - 68
  • [4] Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
  • [5] Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
    Heuser, Annelie
    Picek, Stjepan
    Guilley, Sylvain
    Mentens, Nele
    [J]. RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY, 2017, 10155 : 91 - 104
  • [6] A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis
    Li, Huimin
    Krcek, Marina
    Perin, Guilherme
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 126 - 143
  • [7] Suggestion of Testing Method for Industrial Level Cyber-Physical System in Complex Environment
    Kim, Jiseob
    Chon, Sunil
    Park, Jihwan
    [J]. 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2019), 2019, : 148 - 152
  • [8] A machine learning approach against a masked AES Reaching the limit of side-channel attacks with a learning model
    Lerman, Liran
    Bontempi, Gianluca
    Markowitch, Olivier
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2015, 5 (02) : 123 - 139
  • [9] Lu X., 2021, IACR Trans. Cryptogr. Hardw. Embed. Syst, V2021, P235, DOI [10.46586/tches.v2021.i3.235-274, DOI 10.46586/TCHES.V2021.I3.235-274]
  • [10] Maghrebi Houssem, 2016, Security, Privacy and Applied Cryptography Engineering. 6th International Conference, SPACE 2016. Proceedings: LNCS 10076, P3, DOI 10.1007/978-3-319-49445-6_1