Weakly Profiling Side-channel Analysis

被引:0
|
作者
Wu, Lichao [1 ]
Perin, Guilherme [2 ]
Picek, Stjepan [3 ]
机构
[1] Technical University of Darmstadt, Darmstadt, Germany
[2] Leiden University, Leiden, Netherlands
[3] Radboud University, Nijmegen, Netherlands
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2024年 / 2024卷 / 03期
关键词
Profiling side-channel analysis; recognized for its robust attack performance in worst-case scenarios; necessitates adversaries to have a cloned device for profiling measurements and secret information for data labeling. On the other hand; non-profiling attacks eschew these requirements by trying all key guesses. Although more suitable for real-world attack scenarios; they may suffer from mediocre attack performance due to the lack of leakage insight. This paper introduces a novel weakly profiling side-channel analysis method that bridges classical profiling and non-profiling analyses. Our method operates within a profiling framework yet discards the necessity for a cloned device; which relies on the fact that there is (commonly) a bijective relationship between known information; such as plaintext and ciphertext; and secret information. This relationship allows an adversary to label leakage measurements using known information and then profile leakages directly on the attacked device. The empirical results show that the proposed approach achieves at least three times better attack performance with negligible computational effort than existing non-profiling methods. Moreover; it can rival the performance of state-of-the-art profiling attacks. © 2024; Ruhr-University of Bochum. All rights reserved;
D O I
10.46586/tches.v2024.i3.707-730
中图分类号
学科分类号
摘要
引用
收藏
页码:707 / 730
相关论文
共 50 条
  • [1] Performance Analysis of Multilayer Perceptron in Profiling Side-Channel Analysis
    Weissbart, Leo
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 198 - 216
  • [2] On the Importance of Pooling Layer Tuning for Profiling Side-Channel Analysis
    Wu, Lichao
    Perin, Guilherme
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021, 2021, 12809 : 114 - 132
  • [3] Side-Channel Analysis of Keymill
    Dobraunig, Christoph
    Eichlseder, Maria
    Korak, Thomas
    Mendel, Florian
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 138 - 152
  • [4] On XTR and side-channel analysis
    Page, D
    Stam, M
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 54 - 68
  • [5] On XTR and side-channel analysis
    Page, Daniel
    Stam, Martijn
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3357 : 54 - 68
  • [6] Federated Learning in Side-Channel Analysis
    Wang, Huanyu
    Dubrova, Elena
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 257 - 272
  • [7] Side-Channel Analysis of the TERO PUF
    Tebelmann, Lars
    Pehl, Michael
    Immler, Vincent
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 43 - 60
  • [8] Abacus: Precise Side-Channel Analysis
    Bao, Qinkun
    Wang, Zihao
    Li, Xiaoting
    Larus, James R.
    Wu, Dinghao
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 797 - 809
  • [9] Use of simulators for side-channel analysis
    Veshchikov, Nikita
    Guilley, Sylvain
    2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 51 - 59
  • [10] Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    Chevallier-Mames, B
    Ciet, M
    Joye, M
    IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (06) : 760 - 768