End-to-end automated cache-timing attack driven by machine learning

被引:0
|
作者
Thomas Perianin
Sebastien Carré
Victor Dyseryn
Adrien Facon
Sylvain Guilley
机构
[1] Secure-IC K.K.,LTCI, Telecom
[2] Think Ahead Business Line,Paris
[3] Institut Polytechnique de Paris,Département d’informatique, École normale supérieure, CNRS
[4] PSL Research University,undefined
来源
Journal of Cryptographic Engineering | 2021年 / 11卷
关键词
Side-channel analysis; Cache-timing attacks; Machine learning; Connectionist temporal classification (CTC); Recurrent neural network (RNN);
D O I
暂无
中图分类号
学科分类号
摘要
Cache-timing attacks are serious security threats that exploit cache memories to steal secret information. We believe that the identification of a sequence of function calls from cache-timing data measurements is not a trivial step when building an attack. We present a recurrent neural network model able to automatically retrieve a sequence of operations from cache timings. Inspired from natural language processing, our model is able to learn on partially labelled data. We use the model to unfold an end-to-end automated attack on OpenSSL ECDSA on the secp256k1 curve. Our attack is able to extract the 256 bits of the secret key by automatic analysis of about 2400 traces without any human processing.
引用
收藏
页码:135 / 146
页数:11
相关论文
共 50 条
  • [1] End-to-end automated cache-timing attack driven by machine learning
    Perianin, Thomas
    Carre, Sebastien
    Dyseryn, Victor
    Facon, Adrien
    Guilley, Sylvain
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (02) : 135 - 146
  • [2] Cache-Timing Attack Against HQC
    Huang S.
    Sim R.Q.
    Chuengsatiansup C.
    Guo Q.
    Johansson T.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03): : 136 - 163
  • [3] AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks
    Luo, Mulong
    Xiong, Wenjie
    Lee, Geunbae
    Li, Yueying
    Yang, Xiaomeng
    Zhang, Amy
    Tian, Yuandong
    Lee, Hsien-Hsin S.
    Suh, G. Edward
    2023 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA, 2023, : 317 - 332
  • [4] Measurement Program: Investigation on Cache-Timing Attack
    Khalid, Yasir
    Dippel, Uwe
    Yussof, Salman
    2009 IEEE 9TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), 2009, : 187 - 192
  • [5] PyODDS: An End-to-end Outlier Detection System with Automated Machine Learning
    Li, Yuening
    Zha, Daochen
    Venugopal, Praveen
    Zou, Na
    Hu, Xia
    WWW'20: COMPANION PROCEEDINGS OF THE WEB CONFERENCE 2020, 2020, : 153 - 157
  • [6] End-to-end Machine Learning using Kubeflow
    George, Johnu
    Saha, Amit
    PROCEEDINGS OF THE 5TH JOINT INTERNATIONAL CONFERENCE ON DATA SCIENCE & MANAGEMENT OF DATA, CODS COMAD 2022, 2022, : 336 - 338
  • [7] Machine Learning for End-to-End Congestion Control
    Zhang, Ticao
    Mao, Shiwen
    IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (06) : 52 - 57
  • [8] End-to-End Machine Learning with Apache AsterixDB
    Alkowaileet, Wail
    Alsubaiee, Sattam
    Carey, Michael J.
    Li, Chen
    Ramampiaro, Heri
    Sinthong, Phanwadee
    Wang, Xikui
    PROCEEDINGS OF THE SECOND WORKSHOP ON DATA MANAGEMENT FOR END-TO-END MACHINE LEARNING, 2018,
  • [9] BioAutoMATED: An end-to-end automated machine learning tool for explanation and design of biological sequences
    Valeri, Jacqueline A.
    Soenksen, Luis R.
    Collins, Katherine M.
    Ramesh, Pradeep
    Cai, George
    Powers, Rani
    Angenent-Mari, Nicolaas M.
    Camacho, Diogo M.
    Wong, Felix
    Lu, Timothy K.
    Collins, James J.
    CELL SYSTEMS, 2023, 14 (06) : 525 - +
  • [10] OCC: An Automated End-to-End Machine Learning Optimizing Compiler for Computing-In-Memory
    Siemieniuk, Adam
    Chelini, Lorenzo
    Khan, Asif Ali
    Castrillon, Jeronimo
    Drebes, Andi
    Corporaal, Henk
    Grosser, Tobias
    Kong, Martin
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (06) : 1674 - 1686