Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber

被引:0
|
作者
Chen, Peng [1 ,2 ]
Cheng, Chi [1 ,2 ]
Li, Jinnuo [1 ,2 ]
Zhu, Tianqing [3 ]
机构
[1] China Univ Geosci, Sch Comp Sci, Wuhan, Peoples R China
[2] Hubei Key Lab Intelligent Geoinformat Proc, Wuhan, Peoples R China
[3] City Univ Macau, Fac Data Sci, Macau, Macao, Peoples R China
基金
中国国家自然科学基金;
关键词
Key Encapsulation Mechanism; Kyber; Side-Channel Attack; Portability;
D O I
10.1007/978-981-97-9053-1_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite extensive research on side-channel attacks (SCAs) against lattice-based Key Encapsulation Mechanisms (KEMs), there has been limited attention to the portability of existing deep-learning-based SCA distinguisher, especially concerning the National Institute of Standards and Technology (NIST) KEM standard Kyber. Our work addresses the portability challenges that stem from the device and measurement variations in SCAs against Kyber. We focus on the plaintext checking oracle-based SCA against Kyber, a prominent method in the field. We propose the Ablated Multiple Leakage Point Model (Ablated-MLPM) approach to optimize deep learning models, enhancing intraboard (same device with different EM probe placement) and inter-board (different devices) portability while mitigating overfitting concerns. Our contributions include the first systematic analysis of portability issues in SCAs against Kyber, highlighting their negative impact on attack efficiency. Real-world implementations are conducted on an STM32F407G board with an ARM Cortex-M4 microcontroller, using code from the well-known open-source pqm4 library. The results demonstrate that our Ablated-MLPM approach achieves more than 99% accuracy in all datasets, significantly enhancing both intra-board and inter-board portability. Furthermore, we introduce a lightweight model, Ablated-MLPM-LW, reducing the training parameters by 79.63% at the cost of requiring more queries.
引用
收藏
页码:151 / 167
页数:17
相关论文
共 50 条
  • [41] Autoscaled-Wavelet Convolutional Layer for Deep Learning-Based Side-Channel Analysis
    Bae, Daehyeon
    Park, Dongjun
    Kim, Gyusang
    Choi, Minsig
    Lee, Nayeon
    Kim, Heeseok
    Hong, Seokhie
    IEEE ACCESS, 2023, 11 : 95381 - 95395
  • [42] Controlling the Deep Learning-Based Side-Channel Analysis: A Way to Leverage from Heuristics
    Paguada, Servio
    Rioja, Unai
    Armendariz, Igor
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 106 - 125
  • [43] A Novel Side-Channel Archive Framework Using Deep Learning-Based Leakage Compression
    Jung, Sangyun
    Jin, Sunghyun
    Kim, Heeseok
    IEEE ACCESS, 2024, 12 : 105326 - 105336
  • [44] Improved Hybrid Bagging Resampling Framework for Deep Learning-Based Side-Channel Analysis
    Hameed, Faisal
    Ramesh, Sumesh Manjunath
    Alkhzaimi, Hoda
    COMPUTERS, 2024, 13 (08)
  • [45] Side-Channel Attacks and Machine Learning Approach
    Levina, Alia
    Sleptsova, Daria
    Zaitsev, Oleg
    2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 181 - 186
  • [46] Enhancing EMI-Packaging to Protect against Fault Injection and Side-Channel Attacks
    Avital, Moshe
    Weisman, Gil
    Moscovitz, Doron
    Levi, Itamar
    2024 IEEE INTERNATIONAL CONFERENCE ON MICROWAVES, COMMUNICATIONS, ANTENNAS, BIOMEDICAL ENGINEERING AND ELECTRONIC SYSTEMS, COMCAS 2024, 2024,
  • [47] Securing designs against scan-based side-channel attacks
    Lee, Jeremy
    Tehranipoor, Mohammad
    Patel, Chintan
    Plusquellic, Jim
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 325 - 336
  • [48] A New Countermeasure against Scan-Based Side-Channel Attacks
    Luo, Yanhui
    Cui, Aijiao
    Qu, Gang
    Li, Huawei
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 1722 - 1725
  • [49] Architecting against Software Cache-Based Side-Channel Attacks
    Kong, Jingfei
    Aciicmez, Onur
    Seifert, Jean-Pierre
    Zhou, Huiyang
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (07) : 1276 - 1288
  • [50] Multi-Source Training Deep-Learning Side-Channel Attacks
    Wang, Huanyu
    Forsmark, Sebastian
    Brisfors, Martin
    Dubrova, Elena
    2020 IEEE 50TH INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL 2020), 2020, : 58 - 63