Adaptive Chosen-Plaintext Deep-Learning-Based Side-Channel Analysis

被引:0
|
作者
Li, Yanbin [1 ,2 ,3 ]
Huang, Yuxin [4 ]
Guo, Yikang [4 ]
Ge, Chunpeng [1 ]
Kong, Fanyu [1 ]
Ren, Yongjun [5 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Henan Key Lab Network Cryptog Technol, Zhengzhou 450000, Peoples R China
[4] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing 210095, Peoples R China
[5] Nanjing Univ Informat Sci & Technol, Sch Comp, Nanjing 210044, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 01期
基金
中国国家自然科学基金;
关键词
Internet of Things; Cryptography; Analytical models; Sensitivity analysis; Entropy; Deep learning; Adaptation models; Chosen-plaintext (CP); deep learning; Internet of Things (IoT); side-channel analysis; POWER ANALYSIS;
D O I
10.1109/JIOT.2024.3460802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Profiled side-channel analysis presents a significant risk to embedded devices in Internet of Things (IoT). Typically, a single trace is insufficient to successfully key recovery in practical scenarios. It still requires several traces based on Bayes' posterior probability. In this article, we introduce a chosen-plaintext (CP) strategy into the deep learning-based profiled attacks to improve the attack efficiency. First, we present a general strategy to profile the leakage model by exploiting the sensitivity analysis and clustering analysis. The leakage model derived from deep neural network is to characterize the leakage of the target algorithm. Second, we propose an adaptive CP method in the deep learning-based attack, transforming the conditional probability distribution of the leakage into the entropy of the key candidates under the profiled leakage model. Finally, we evaluate the efficiency of the attack by practical measurements. The results demonstrate that the proposed method requires fewer traces to retrieve the key of AES on devices of different types, e.g., Smartcard, FPGA, and ARM. Moreover, our attack improves the attack efficiency on masked implementations.
引用
收藏
页码:174 / 185
页数:12
相关论文
共 50 条
  • [41] Multi-Leak Deep-Learning Side-Channel Analysis
    Hu, Fanliang
    Wang, Huanyu
    Wang, Junnian
    IEEE ACCESS, 2022, 10 : 22610 - 22621
  • [42] Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis
    Wu, Lichao
    Won, Yoo-Seung
    Jap, Dirmanto
    Perin, Guilherme
    Bhasin, Shivam
    Picek, Stjepan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (03) : 1331 - 1341
  • [43] Controlling the Deep Learning-Based Side-Channel Analysis: A Way to Leverage from Heuristics
    Paguada, Servio
    Rioja, Unai
    Armendariz, Igor
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 106 - 125
  • [44] Non-profiled deep learning-based side-channel attacks with sensitivity analysis
    Timon, Benjamin
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (02): : 107 - 131
  • [45] Improved Hybrid Bagging Resampling Framework for Deep Learning-Based Side-Channel Analysis
    Hameed, Faisal
    Ramesh, Sumesh Manjunath
    Alkhzaimi, Hoda
    COMPUTERS, 2024, 13 (08)
  • [46] One for All, All for Ascon: Ensemble-Based Deep Learning Side-Channel Analysis
    Rezaeezade, Azade
    Basurto-Becerra, Abraham
    Weissbart, Leo
    Perin, Guilherme
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT I, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14586 : 139 - 157
  • [47] Overview of Machine Learning Based Side-Channel Analysis Methods
    Jap, Dirmanto
    Breier, Jakub
    2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 38 - 41
  • [48] Autoscaled-Wavelet Convolutional Layer for Deep Learning-Based Side-Channel Analysis
    Bae, Daehyeon
    Park, Dongjun
    Kim, Gyusang
    Choi, Minsig
    Lee, Nayeon
    Kim, Heeseok
    Hong, Seokhie
    IEEE ACCESS, 2023, 11 : 95381 - 95395
  • [49] Improving Deep Learning Based Second-Order Side-Channel Analysis With Bilinear CNN
    Cao, Pei
    Zhang, Chi
    Lu, Xiangjun
    Gu, Dawu
    Xu, Sen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3863 - 3876
  • [50] Improving Deep Learning Based Second-Order Side-Channel Analysis with Bilinear CNN
    Cao, Pei
    Zhang, Chi
    Lu, Xiangjun
    Gu, Dawu
    Xu, Sen
    IEEE Transactions on Information Forensics and Security, 2022, 17 : 3863 - 3876