Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location

被引:1
|
作者
Li, Yanbin [1 ,2 ,3 ]
Zhu, Jiajie [2 ,4 ]
Liu, Zhe [5 ]
Tang, Ming [6 ,7 ]
Ren, Shougang [8 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[4] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing 210095, Peoples R China
[5] Zhejiang Lab, Hangzhou 311121, Peoples R China
[6] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
[7] Wuhan Univ, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Hubei, Peoples R China
[8] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Side-channel attacks; leakage location; gradient visualization; deep learning; MASKING; CIRCUITS; SECURE;
D O I
10.1109/TIFS.2024.3350375
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While side-channel attacks (SCAs) have become a significant threat to cryptographic algorithms, masking is considered as an effective countermeasure against SCAs. On the one hand, securely implementing the scheme is a challenging and error-prone task. It is essential to detect leakage in a complicated cryptographic circuit. However, the traditional method of leakage detection is always inaccuracy or time consumption. On the other hand, the deep learning-based power attacks have shown their threat to the masking without combining functions. Compared to the leakage detection done under the traditional provable security framework, the security evaluation against deep learning-based attacks at the pre-silicon stage has not been discussed. To this end, this paper investigates the strategies of leveraging the deep learning techniques to achieve an efficient leakage location method. In this paper, we present the first approach utilizing deep learning-based leakage location for both unprotected and protected implementations at the pre-silicon stage. Firstly, we propose the leakage location method named Gradient Visualization-based location (GVL), which provides leakage location at the different levels of design. Gradient visualization is known as a sensitivity analysis method to understand better how a natural network can learn to predict the sensitive label based on the input. We theoretically show how the gradient visualization can be used to locate leakage components in the netlist efficiently. Moreover, we link the result with the metric in deep learning-based leakage assessment, which fills the lack of leakage evaluation at the pre-silicon stage against deep learning-based SCAs. We further confirm the effectiveness of the proposed method on unprotected implementation, low entropy masked implementation, and provable secure masked implementation. The results show that the proposed methodology outperforms the traditional location methods in the masked cases, where the time consumption is reduced by about 2x to 10x with fewer false negatives and no false positives.
引用
收藏
页码:2340 / 2355
页数:16
相关论文
共 50 条
  • [41] A Frequency-based Leakage Assessment Methodology for Side-Channel Evaluations
    Lei, Wan
    Wang, Lihui
    Shan, Weijun
    Jiang, Kun
    Li, Qing
    2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, : 590 - 593
  • [42] Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis
    Rezaeezade, Azade
    Batina, Lejla
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, : 609 - 629
  • [43] Still Making Noise: Improving Deep-Learning-Based Side-Channel Analysis
    Kim, Jaehun
    Picek, Stjepan
    Heuser, Annelie
    Bhasin, Shivam
    Hanjalic, Alan
    IEEE Design and Test, 2025, 42 (01): : 20 - 27
  • [44] Verification of Power-based Side-channel Leakage through Simulation
    Yao, Yuan
    Schaumont, Patrick
    Van Woudenberg, Jasper
    Breunesse, Cees-Bart
    Santillan, Edgar Mateos
    Stecyk, Steve
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 1112 - 1115
  • [45] Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis
    Perin, Guilherme
    Wu, Lichao
    Picek, Stjepan
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 828 - 861
  • [46] A Deep-Learning Approach to Side-Channel Based CPU Disassembly at Design Time
    Fendri, Hedi
    Macchetti, Marco
    Perrine, Jerome
    Stojilovic, Mirjana
    PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, : 670 - 675
  • [47] Non-Profiled Deep Learning-Based Side-Channel Preprocessing With Autoencoders
    Kwon, Donggeun
    Kim, Heeseok
    Hong, Seokhie
    IEEE ACCESS, 2021, 9 : 57692 - 57703
  • [48] Research on Side-channel Attack Based on Stochastic Model with Lower Leakage
    Liu, Zixin
    Zhu, Ting
    5TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2020), 2020, 1575
  • [49] On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis
    Hajra, Suvadeep
    Alam, Manaar
    Saha, Sayandeep
    Picek, Stjepan
    Mukhopadhyay, Debdeep
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 514 - 528
  • [50] Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds
    Swaminathan, Sudharshan
    Chmielewski, Lukasz
    Perin, Guilherme
    Picek, Stjepan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 165 - 182