Performance Analysis of Deep Learning Based Non-profiled Side Channel Attacks Using Significant Hamming Weight Labeling
Mobile Networks and Applications - Trang 1-10 - 2023
Tóm tắt
The use of deep learning (DL) techniques for side-channel analysis (SCA) has become increasingly popular recently. This paper assesses the application of DL to non-profiled SCA attacks on AES-128 encryption, taking into consideration various challenges, including high-dimensional data, imbalanced classes, and countermeasures. The paper proposes using a multi-layer perceptron (MLP) and a convolutional neural network (CNN) to tackle hiding protection methods, such as noise generation and de-synchronization. The paper also introduces a technique called significant Hamming weight (SHW) labeling and a dataset reconstruction approach to handle imbalanced datasets, resulting in a reduction of 30% in the number of measurements required for training. The experimental results on reconstructed dataset demonstrate improved performance in DL-based SCA compared to binary labeling techniques, especially in the face of hiding countermeasures. This leads to better results for non-profiled attacks on different targets, such as ASCAD and RISC-V microcontrollers.
Tài liệu tham khảo
Hettwer TGB, Gehrer S (2020) Applications of machine learning techniques in side-channel attacks: a survey. J Cryptogr Eng 10:135–162
Timon B (2019) Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019(2), 107–131. https://doi.org/10.13154/tches.v2019.i2.107-131
Picek S, Samiotis IP, Kim J, Heuser A, Bhasin S, Legay A (2018) On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay A, Rebeiro C, Yarom Y (eds) Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing, Cham, pp 157–176
Alipour A, Papadimitriou A, Beroulle V, Aerabi E, Hély D (2020) On the performance of non-profiled differential deep learning attacks against an aes encryption algorithm protected using a correlated noise generation based hiding countermeasure. In: 2020 Design, Automation Test in Europe Conference Exhibition (DATE). pp 614–617
Won Y-S, Han D-G, Jap D, Bhasin S, Park J-Y (2021) Non-profiled side-channel attack based on deep learning using picture trace. IEEE Access 9:22 480–22 492
Do NT, Hoang VP , Doan VS (2020) Performance analysis of non-profiled side channel attacks based on convolutional neural networks. In: 2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). pp 66–69
Bae DBD, Bae JHD, Hwang JHJ (2022) Deep learning-based attacks on masked AES implementation. Journal of Internet Technology 23(4):897–902
Lerman L, Bontempi G, Markowitch O (2014) A machine learning approach against a masked aes. Journal of Cryptographic Engineering 5:123–139
Gilmore R, Hanley N, O’Neill M (2015) Neural network based attack on a masked implementation of aes. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). pp 106–111
Prouff E, Strullu R, Benadjila R, Cagli E, Canovas C (2018) Study of deep learning techniques for side-channel analysis and introduction to ascad database. IACR Cryptol. ePrint Arch 2018:53
Picek S, Heuser A, Jovic A, Bhasin S, Regazzoni F (2018) The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. https://ia.cr/2018/476
Cagli E, Dumas C, Prouff E (2017) Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer W, Homma N (eds) Cryptographic Hardware and Embedded Systems - CHES 2017. Springer International Publishing, Cham, pp 45–68
Hu W, Wu L, Wang A, Xie X, Zhu Z, Luo S (2014) Adaptive chosen-plaintext correlation power analysis. In: 2014 Tenth International Conference on Computational Intelligence and Security. pp 494–498
Do N-T, Hoang V-P (2020) An efficient side channel attack technique with improved correlation power analysis. In: Vo N-S, Hoang V-P (eds) Industrial Networks and Intelligent Systems. Springer International Publishing, Cham, pp 291–300
Kingma D, Ba J (2014) Adam: A method for stochastic optimization. International Conference on Learning Representations 12