Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis

被引:0
|
作者
Perin G. [1 ,2 ]
Chmielewski Ł. [1 ]
Picek S. [2 ]
机构
[1] Riscure BV, Netherlands
[2] Delft University of Technology, Netherlands
基金
欧盟地平线“2020”;
关键词
Ensemble Learning; Model Generalization; Neural Networks; Side-channel Analysis;
D O I
10.13154/tches.v2020.i4.337-364
中图分类号
学科分类号
摘要
The adoption of deep neural networks for profiled side-channel attacks provides powerful options for leakage detection and key retrieval of secure products. When training a neural network for side-channel analysis, it is expected that the trained model can implement an approximation function that can detect leaking side-channel samples and, at the same time, be insensible to noisy (or non-leaking) samples. This outlines a generalization situation where the model can identify the main representations learned from the training set in a separate test set. This paper discusses how output class probabilities represent a strong metric when conducting the side-channel analysis. Further, we observe that these output probabilities are sensitive to small changes, like selecting specific test traces or weight initialization for a neural network. Next, we discuss the hyperparameter tuning, where one commonly uses only a single out of dozens of trained models, where each of those models will result in different output probabilities. We show how ensembles of machine learning models based on averaged class probabilities can improve gen-eralization. Our results emphasize that ensembles increase a profiled side-channel attack’s performance and reduce the variance of results stemming from different hyperparameters, regardless of the selected dataset or leakage model. © 2020, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:337 / 364
页数:27
相关论文
共 50 条
  • [21] Machine learning in side-channel analysis: a first study
    Hospodar, Gabriel
    Gierlichs, Benedikt
    De Mulder, Elke
    Verbauwhede, Ingrid
    Vandewalle, Joos
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) : 293 - 302
  • [22] One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA
    Weissbart, Leo
    Picek, Stjepan
    Batina, Lejla
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 86 - 105
  • [23] Machine Learning-Based Classification of Hardware Trojans Using Power Side-Channel Signals
    Bhatta, Niraj Prasad
    Giri, Usha
    Amsaad, Fathi
    Midwest Symposium on Circuits and Systems, 2024, : 990 - 994
  • [24] Profiled Side-Channel Analysis in the Efficient Attacker Framework
    Picek, Stjepan
    Heuser, Annelie
    Perin, Guilherme
    Guilley, Sylvain
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 44 - 63
  • [25] Side-Channel Analysis and Machine Learning: A Practical Perspective
    Picek, Stjepan
    Heuser, Annelie
    Jovic, Alan
    Ludwig, Simone A.
    Guilley, Sylvain
    Jakobovic, Domagoj
    Mentens, Nele
    2017 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2017, : 4095 - 4102
  • [26] Leakage Prototype Learning for Profiled Differential Side-Channel Cryptanalysis
    Bartkewitz, Timo
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1761 - 1774
  • [27] Convolutional Neural Networks for Profiled Side-Channel Analysis
    Hou, Shourong
    Zhou, Yujie
    Liu, Hongming
    RADIOENGINEERING, 2019, 28 (03) : 651 - 658
  • [28] Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis
    Rezaeezade, Azade
    Batina, Lejla
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (04) : 609 - 629
  • [29] Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis
    Perin, Guilherme
    Wu, Lichao
    Picek, Stjepan
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 828 - 861
  • [30] Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds
    Swaminathan, Sudharshan
    Chmielewski, Lukasz
    Perin, Guilherme
    Picek, Stjepan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 165 - 182