Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location

被引:1
|
作者
Li, Yanbin [1 ,2 ,3 ]
Zhu, Jiajie [2 ,4 ]
Liu, Zhe [5 ]
Tang, Ming [6 ,7 ]
Ren, Shougang [8 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[4] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing 210095, Peoples R China
[5] Zhejiang Lab, Hangzhou 311121, Peoples R China
[6] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
[7] Wuhan Univ, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Hubei, Peoples R China
[8] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Side-channel attacks; leakage location; gradient visualization; deep learning; MASKING; CIRCUITS; SECURE;
D O I
10.1109/TIFS.2024.3350375
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While side-channel attacks (SCAs) have become a significant threat to cryptographic algorithms, masking is considered as an effective countermeasure against SCAs. On the one hand, securely implementing the scheme is a challenging and error-prone task. It is essential to detect leakage in a complicated cryptographic circuit. However, the traditional method of leakage detection is always inaccuracy or time consumption. On the other hand, the deep learning-based power attacks have shown their threat to the masking without combining functions. Compared to the leakage detection done under the traditional provable security framework, the security evaluation against deep learning-based attacks at the pre-silicon stage has not been discussed. To this end, this paper investigates the strategies of leveraging the deep learning techniques to achieve an efficient leakage location method. In this paper, we present the first approach utilizing deep learning-based leakage location for both unprotected and protected implementations at the pre-silicon stage. Firstly, we propose the leakage location method named Gradient Visualization-based location (GVL), which provides leakage location at the different levels of design. Gradient visualization is known as a sensitivity analysis method to understand better how a natural network can learn to predict the sensitive label based on the input. We theoretically show how the gradient visualization can be used to locate leakage components in the netlist efficiently. Moreover, we link the result with the metric in deep learning-based leakage assessment, which fills the lack of leakage evaluation at the pre-silicon stage against deep learning-based SCAs. We further confirm the effectiveness of the proposed method on unprotected implementation, low entropy masked implementation, and provable secure masked implementation. The results show that the proposed methodology outperforms the traditional location methods in the masked cases, where the time consumption is reduced by about 2x to 10x with fewer false negatives and no false positives.
引用
收藏
页码:2340 / 2355
页数:16
相关论文
共 50 条
  • [31] A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis
    Li, Huimin
    Krcek, Marina
    Perin, Guilherme
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 126 - 143
  • [32] Research on Side-Channel Analysis Based on Deep Learning with Different Sample Data
    Chang, Lipeng
    Wei, Yuechuan
    He, Shuiyu
    Pan, Xiaozhong
    APPLIED SCIENCES-BASEL, 2022, 12 (16):
  • [33] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    DATA SCIENCE, PT 1, 2017, 727 : 549 - 557
  • [34] Silicon-correlated Simulation Methodology of EM Side-channel Leakage Analysis
    Monta, Kazuki
    Lin, Lang
    Wen, Jimin
    Shrivastav, Harsh
    Chow, Calvin
    Chen, Hua
    Geada, Joao
    Chowdhury, Sreeja
    Pundir, Nitin
    Chang, Norman
    Nagata, Makoto
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2023, 19 (01)
  • [35] Deep-Learning Based Nonprofiling Side-Channel Attack on Mask Leakage-Free Environments Using Broadcast Operation
    Lim, Seonghyuck
    Mun, Hye-Won
    Han, Dong-Guk
    IEEE ACCESS, 2023, 11 : 94335 - 94345
  • [36] Leveraging Deep CNN and Transfer Learning for Side-Channel Attack
    Garg, Amit
    Karimian, Nima
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 91 - 96
  • [37] Deep learning for side-channel analysis and introduction to ASCAD database
    Ryad Benadjila
    Emmanuel Prouff
    Rémi Strullu
    Eleonora Cagli
    Cécile Dumas
    Journal of Cryptographic Engineering, 2020, 10 : 163 - 188
  • [38] Deep learning for side-channel analysis and introduction to ASCAD database
    Benadjila, Ryad
    Prouff, Emmanuel
    Strullu, Remi
    Cagli, Eleonora
    Dumas, Cecile
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 163 - 188
  • [39] How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
    Alam, Manaar
    Mukhopadhyay, Debdeep
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [40] Side-Channel Information Leakage of Code-Based Masked Implementations
    Cheng, Wei
    Rioul, Olivier
    Liu, Yi
    Beguinot, Julien
    Guilley, Sylvain
    2022 17TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2022, : 51 - 56