Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location

被引:1
|
作者
Li, Yanbin [1 ,2 ,3 ]
Zhu, Jiajie [2 ,4 ]
Liu, Zhe [5 ]
Tang, Ming [6 ,7 ]
Ren, Shougang [8 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[4] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing 210095, Peoples R China
[5] Zhejiang Lab, Hangzhou 311121, Peoples R China
[6] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
[7] Wuhan Univ, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Hubei, Peoples R China
[8] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Side-channel attacks; leakage location; gradient visualization; deep learning; MASKING; CIRCUITS; SECURE;
D O I
10.1109/TIFS.2024.3350375
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While side-channel attacks (SCAs) have become a significant threat to cryptographic algorithms, masking is considered as an effective countermeasure against SCAs. On the one hand, securely implementing the scheme is a challenging and error-prone task. It is essential to detect leakage in a complicated cryptographic circuit. However, the traditional method of leakage detection is always inaccuracy or time consumption. On the other hand, the deep learning-based power attacks have shown their threat to the masking without combining functions. Compared to the leakage detection done under the traditional provable security framework, the security evaluation against deep learning-based attacks at the pre-silicon stage has not been discussed. To this end, this paper investigates the strategies of leveraging the deep learning techniques to achieve an efficient leakage location method. In this paper, we present the first approach utilizing deep learning-based leakage location for both unprotected and protected implementations at the pre-silicon stage. Firstly, we propose the leakage location method named Gradient Visualization-based location (GVL), which provides leakage location at the different levels of design. Gradient visualization is known as a sensitivity analysis method to understand better how a natural network can learn to predict the sensitive label based on the input. We theoretically show how the gradient visualization can be used to locate leakage components in the netlist efficiently. Moreover, we link the result with the metric in deep learning-based leakage assessment, which fills the lack of leakage evaluation at the pre-silicon stage against deep learning-based SCAs. We further confirm the effectiveness of the proposed method on unprotected implementation, low entropy masked implementation, and provable secure masked implementation. The results show that the proposed methodology outperforms the traditional location methods in the masked cases, where the time consumption is reduced by about 2x to 10x with fewer false negatives and no false positives.
引用
收藏
页码:2340 / 2355
页数:16
相关论文
共 50 条
  • [21] Side-Channel Leakage Detection Based on Constant Parameter Channel Model
    Yang, Wei
    Zhang, Hailong
    Gao, Yansong
    Fu, Anmin
    Wei, Songjie
    2020 IEEE 38TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2020), 2020, : 553 - 560
  • [22] A comprehensive study of deep learning for side-channel analysis
    Masure L.
    Dumas C.
    Prouff E.
    2020, Ruhr-University of Bochum (2020): : 348 - 375
  • [23] TSCL: A time-space crossing location for side-channel leakage detection
    Li, Yanbin
    Zhu, Jiajie
    Tang, Ming
    Ren, Shougang
    Wu, Fusheng
    COMPUTER NETWORKS, 2022, 216
  • [24] A Pre-Silicon Power Leakage Assessment Based on Generative Adversarial Networks
    Aljuffri, Abdullah
    Saxena, Mudit
    Reinbrecht, Cezar
    Hamdioui, Said
    Taouil, Mottaqiallah
    2023 26TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN, DSD 2023, 2023, : 87 - 94
  • [25] Rassle: Return address stack based side-channel leakage
    Chakraborty, Anirban
    Bhattacharya, Sarani
    Alam, Manaar
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (02): : 275 - 303
  • [26] Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks
    Kim, Hodong
    Hahn, Changhee
    Kim, Hyunwoo J.
    Shin, Youngjoo
    Hur, Junbeom
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1672 - 1686
  • [27] Side-Channel Leakage Amount Estimation Based on Communication Theory
    Yang, Wei
    Zhang, Hailong
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [28] Deep learning-based classification and anomaly detection of side-channel signals
    Wang, Xiao
    Zhou, Quan
    Harer, Jacob
    Brown, Gavin
    Qiu, Shangran
    Dou, Zhi
    Wang, John
    Hinton, Alan
    Gonzalez, Carlos Aguayo
    Chin, Peter
    CYBER SENSING 2018, 2018, 10630
  • [29] Deep Learning towards Expertise Development in a Visualization-based Learning Environment
    Yuan, Bei
    Wang, Minhong
    Kushniruk, Andre W.
    Peng, Jun
    EDUCATIONAL TECHNOLOGY & SOCIETY, 2017, 20 (04): : 233 - 246
  • [30] Effective Deep Learning-based Side-Channel Analyses Against ASCAD
    Liu, Junkai
    Zheng, Shihui
    Gu, Lize
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 514 - 523