Automated Side-Channel Attacks using Black-Box Neural Architecture Search

被引:1
|
作者
Gupta, Pritha [1 ]
Drees, Jan Peter [2 ]
Huellermeier, Eyke [3 ]
机构
[1] Paderborn Univ, Paderborn, Germany
[2] Univ Wuppertal, Wuppertal, Germany
[3] Univ Munich LMU, Munich, Germany
基金
欧洲研究理事会;
关键词
Neural Architecture Search; Parameter Study; Convolutional Neural Network; Side-Channel Attack; AES;
D O I
10.1145/3600160.3600161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of convolutional neural networks (CNNs) to break cryptographic systems through hardware side-channels facilitated rapid and adaptable attacks on cryptographic systems like smart cards and Trusted Platform Modules (TPMs). However, current approaches rely on manually designed CNN architectures by domain experts, which are time-consuming and impractical for attacking new systems. To overcome this, recent research has delved into the use of neural architecture search (NAS) to discover appropriate CNN architectures automatically. This approach aims to alleviate the bur-den on human experts and facilitate more effcient exploration of new attack targets. However, these works only optimize the architecture using the secret key information from the attack dataset and explore limited search strategies with one-dimensional CNNs. In this work, we propose a fully black-box NAS approach that solely utilizes the profiling dataset for optimization. Through an extensive experimental parameter study, we investigate which choices for NAS, such as using 1-D or 2-D CNNs and various search strategies, produce the best results on 10 state-of-the-art datasets for identity leakage model. Our results demonstrate that applying the Random search strategy on 1-D inputs achieves a high success rate, enabling retrieval of the correct secret key using a single attack trace on two datasets. This combination matches the attack effciency of fixed CNN architectures and outperforms them in 4 out of 10 datasets. Our experiments also emphasize the importance of repeated attack evaluations for ML-based solutions to avoid biased performance estimates.
引用
收藏
页数:27
相关论文
共 50 条
  • [41] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [42] Cache Side-Channel Attacks and Defenses
    Zhang, Weijuan
    Bai, Lu
    Ling, Yuqing
    Lan, Xiao
    Jia, Xiaoqi
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [43] Experimental Investigation of Side-Channel Attacks on Neuromorphic Spiking Neural Networks
    Goswami, Bhanprakash
    Das, Tamoghno
    Suri, Manan
    [J]. IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (02) : 231 - 234
  • [44] A New Foe in GPUs: Power Side-Channel Attacks on Neural Network
    Jeon, Hyeran
    Karimian, Nima
    Lehman, Tamara
    [J]. PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 313 - 313
  • [45] Convolutional Neural Network Based Side-Channel Attacks with Customized Filters
    Wei, Man
    Shi, Danping
    Sun, Siwei
    Wang, Peng
    Hu, Lei
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 799 - 813
  • [46] Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks
    Chabanne, Herve
    Danger, Jean-Luc
    Guiga, Linda
    Kuhne, Ulrich
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2021, 2022, 13162 : 148 - 167
  • [47] Meta-Learning the Search Distribution of Black-Box Random Search Based Adversarial Attacks
    Yatsura, Maksym
    Metzen, Jan Hendrik
    Hein, Matthias
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [48] Side-Channel Inference Attacks on Mobile Keypads Using Smartwatches
    Maiti, Anindya
    Jadliwala, Murtuza
    He, Jibo
    Bilogrevic, Igor
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (09) : 2180 - 2194
  • [49] Extraction of Binarized Neural Network Architecture and Secret Parameters Using Side-Channel Information
    Yli-Mayry, Ville
    Ito, Akira
    Homma, Naofumi
    Bhasin, Shivam
    Jap, Dirmanto
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [50] Architecture for an elliptic curve scalar multiplication resistant to some side-channel attacks
    Yoon, JC
    Jung, SW
    Lee, S
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 139 - 151