Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location

被引:1
|
作者
Li, Yanbin [1 ,2 ,3 ]
Zhu, Jiajie [2 ,4 ]
Liu, Zhe [5 ]
Tang, Ming [6 ,7 ]
Ren, Shougang [8 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[4] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing 210095, Peoples R China
[5] Zhejiang Lab, Hangzhou 311121, Peoples R China
[6] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
[7] Wuhan Univ, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Hubei, Peoples R China
[8] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Side-channel attacks; leakage location; gradient visualization; deep learning; MASKING; CIRCUITS; SECURE;
D O I
10.1109/TIFS.2024.3350375
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While side-channel attacks (SCAs) have become a significant threat to cryptographic algorithms, masking is considered as an effective countermeasure against SCAs. On the one hand, securely implementing the scheme is a challenging and error-prone task. It is essential to detect leakage in a complicated cryptographic circuit. However, the traditional method of leakage detection is always inaccuracy or time consumption. On the other hand, the deep learning-based power attacks have shown their threat to the masking without combining functions. Compared to the leakage detection done under the traditional provable security framework, the security evaluation against deep learning-based attacks at the pre-silicon stage has not been discussed. To this end, this paper investigates the strategies of leveraging the deep learning techniques to achieve an efficient leakage location method. In this paper, we present the first approach utilizing deep learning-based leakage location for both unprotected and protected implementations at the pre-silicon stage. Firstly, we propose the leakage location method named Gradient Visualization-based location (GVL), which provides leakage location at the different levels of design. Gradient visualization is known as a sensitivity analysis method to understand better how a natural network can learn to predict the sensitive label based on the input. We theoretically show how the gradient visualization can be used to locate leakage components in the netlist efficiently. Moreover, we link the result with the metric in deep learning-based leakage assessment, which fills the lack of leakage evaluation at the pre-silicon stage against deep learning-based SCAs. We further confirm the effectiveness of the proposed method on unprotected implementation, low entropy masked implementation, and provable secure masked implementation. The results show that the proposed methodology outperforms the traditional location methods in the masked cases, where the time consumption is reduced by about 2x to 10x with fewer false negatives and no false positives.
引用
收藏
页码:2340 / 2355
页数:16
相关论文
共 50 条
  • [11] Side-channel analysis attacks based on deep learning network
    Ou, Yu
    Li, Lang
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (02)
  • [12] Multilabel Deep Learning-Based Side-Channel Attack
    Zhang, Libang
    Xing, Xinpeng
    Fan, Junfeng
    Wang, Zongyue
    Wang, Suying
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (06) : 1207 - 1216
  • [13] On the Evaluation of Deep Learning-Based Side-Channel Analysis
    Wu, Lichao
    Perin, Guilherme
    Picek, Stjepan
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2022, 2022, 13211 : 49 - 71
  • [14] Side-Channel Leakage on Silicon Substrate of CMOS Cryptographic Chip
    Fujimoto, Daisuke
    Tanaka, Daichi
    Miura, Noriyuki
    Nagata, Makoto
    Hayashi, Yu-ichi
    Homma, Naofumi
    Bhasin, Shivam
    Danger, Jean-Luc
    2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 32 - 37
  • [15] Leakage Prototype Learning for Profiled Differential Side-Channel Cryptanalysis
    Bartkewitz, Timo
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1761 - 1774
  • [16] SoK: Deep Learning-based Physical Side-channel Analysis
    Picek, Stjepan
    Perin, Guilherme
    Mariot, Luca
    Wu, Lichao
    Batina, Lejla
    ACM COMPUTING SURVEYS, 2023, 55 (11)
  • [17] Label Correlation in Deep Learning-Based Side-Channel Analysis
    Wu, Lichao
    Weissbart, Leo
    Krcek, Marina
    Li, Huimin
    Perin, Guilherme
    Batina, Lejla
    Picek, Stjepan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3849 - 3861
  • [18] Challenges in Deep Learning-Based Profiled Side-Channel Analysis
    Picek, Stjepan
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 9 - 12
  • [19] Recent advances in deep learning-based side-channel analysis
    Jin, Sunghyun
    Kim, Suhri
    Kim, HeeSeok
    Hong, Seokhie
    ETRI JOURNAL, 2020, 42 (02) : 292 - 304
  • [20] On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis
    Perin, Guilherme
    Picek, Stjepan
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 615 - 636