Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-Based Side-Channel Attacks

被引:0
|
作者
Fukuda, Yuta [1 ]
Yoshida, Kota [1 ]
Fujino, Takeshi [1 ]
机构
[1] Ritsumeikan Univ, Kusatsu, Shiga, Japan
关键词
side-channel attacks; deep-learning; cluster analysis; POWER ANALYSIS;
D O I
10.1007/978-3-031-61486-6_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Differential deep learning analysis (DDLA) was proposed as a side-channel attack (SCA) with deep learning techniques in non-profiled scenarios at TCHES 2019. In the proposed DDLA, the adversary sets the LSB or MSB of the intermediate value in the encryption process assumed for the key candidates as the ground-truth label and trains a deep neural network (DNN) with power traces as an input. The adversary also observes metrics such as loss and accuracy during DNN training and estimates that the key corresponding to the best-fitting DNN is correct. One of the disadvantages of DDLA is the heavy computation time for the DNN models because the number of required models is the as same as the number of key candidates, which is typically 256 in the case of AES. Furthermore, the DNN models have to be trained again if the adversary changes a ground-truth label function from LSB to other labels such as MSB or HW. We propose a new deep-learning-based SCA in a non-profiled scenario to solve these problems. Our core idea is to conduct dimensionality reduction on the leakage waveform using DNN. The adversary conducts cluster analysis using the feature vectors extracted from power traces using DNN. Only one DNN needs to be trained to reveal all key bytes. In addition, once the DNN is trained, multiple label functions can be tested without the additional cost of training DNNs. We provide two case studies of attacking against AES, including AES without SCA countermeasures and the ASCAD database. The results show that the proposed method requires fewer waveforms to reveal all key bytes than DDLA. In addition, the proposed method requires 1/75 less computation time than DDLA.
引用
收藏
页码:84 / 101
页数:18
相关论文
共 50 条
  • [31] Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks
    Paguada, Servio
    Batina, Lejla
    Buhan, Ileana
    Armendariz, Igor
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2835 - 2847
  • [32] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    DATA SCIENCE, PT 1, 2017, 727 : 549 - 557
  • [33] Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis
    Perin, Guilherme
    Wu, Lichao
    Picek, Stjepan
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 828 - 861
  • [34] An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature
    Chen, Zhaohui
    Karabulut, Emre
    Aysu, Aydin
    Ma, Yuan
    Jing, Jiwu
    2021 IEEE 39TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2021), 2021, : 583 - 590
  • [35] Assessment of Addition-Chain-Based Masked S-Box Using Deep-Learning-Based Side-Channel Attacks
    Li, Huizhong
    Ming, Jingdian
    Zhou, Yongbin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [36] Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution
    Ito, Akira
    Saito, Kotaro
    Ueno, Rei
    Homma, Naofumi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3790 - 3802
  • [37] Assessment of Common Side Channel Countermeasures With Respect To Deep Learning Based Profiled Attacks
    Maghrebi, Houssem
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 126 - 129
  • [38] Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks
    Kim, Hodong
    Hahn, Changhee
    Kim, Hyunwoo J.
    Shin, Youngjoo
    Hur, Junbeom
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1672 - 1686
  • [39] Improving Deep Learning Networks for Profiled Side-channel Analysis Using Performance Improvement Techniques
    Robissout, Damien
    Bossuet, Lilian
    Habrard, Amaury
    Grosso, Vincent
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2021, 17 (03)
  • [40] On the Evaluation of Deep Learning-Based Side-Channel Analysis
    Wu, Lichao
    Perin, Guilherme
    Picek, Stjepan
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2022, 2022, 13211 : 49 - 71