Side-channel analysis based on Siamese neural network

被引:1
|
作者
Li, Di [1 ,2 ]
Li, Lang [1 ,2 ]
Ou, Yu [1 ,2 ]
机构
[1] Hengyang Normal Univ, Coll Comp Sci & Technol, Hengyang 421002, Peoples R China
[2] Hunan Prov Key Lab Intelligent Informat Proc & App, Hengyang 421002, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 04期
关键词
Side-channel analysis; Deep learning; Siamese neural network; Information security; ARTIFICIAL-INTELLIGENCE; ATTACKS;
D O I
10.1007/s11227-023-05631-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the combination of deep learning and side-channel analysis has received extensive attention. Previous research has shown that the key recovery problem can be transformed into a classification problem. The performance of these models strongly depends on the size of the dataset and the number of instances in each target class. The training time is very long. In this paper, the key recovery problem is transformed into a similarity measurement problem in Siamese neural networks. We use simulated power traces and true power traces to form power pairs to augment data and simplify key recovery steps. The trace pairs are selected based on labels and added to the training to improve model performance. The model adopts a Siamese, CNN-based architecture, and it can evaluate the similarity between the inputs. The correct key is revealed by the similarity of different trace pairs. In experiments, three datasets are used to evaluate our method. The results show that the proposed method can be successfully trained with 1000 power traces and has excellent attack efficiency and training speed.
引用
收藏
页码:4423 / 4450
页数:28
相关论文
共 50 条
  • [1] Side-channel analysis based on Siamese neural network
    Di Li
    Lang Li
    Yu Ou
    The Journal of Supercomputing, 2024, 80 : 4423 - 4450
  • [2] Power Side-Channel Analysis and Mitigation for Neural Network Accelerators based on Memristive Crossbars
    Sapui, Brojogopal
    Tahoori, Mehdi B.
    29TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2024, 2024, : 612 - 617
  • [3] Exploration into the Explainability of Neural Network Models for Power Side-Channel Analysis
    Golder, Anupam
    Bhat, Ashwin
    Raychowdhury, Arijit
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 59 - 64
  • [4] Convolutional Neural Network Based Side-Channel Attacks with Customized Filters
    Wei, Man
    Shi, Danping
    Sun, Siwei
    Wang, Peng
    Hu, Lei
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 799 - 813
  • [5] Side-channel analysis attacks based on deep learning network
    Yu Ou
    Lang Li
    Frontiers of Computer Science, 2022, 16
  • [6] Side-channel analysis attacks based on deep learning network
    Yu OU
    Lang LI
    Frontiers of Computer Science, 2022, 16 (02) : 37 - 47
  • [7] Side-channel analysis attacks based on deep learning network
    Ou, Yu
    Li, Lang
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (02)
  • [8] Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis
    Zhang, Yicheng
    Yasaei, Rozhin
    Chen, Hao
    Li, Zhou
    Al Faruque, Mohammad Abdullah
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4377 - 4388
  • [9] A neural network framework based on ConvNeXt for side-channel hardware Trojan detection
    Gao, Yuchan
    Su, Jing
    Li, Jia
    Wang, Shenglong
    Li, Chao
    ETRI JOURNAL, 2024,
  • [10] Power Side-Channel Attacks and Defenses for Neural Network Accelerators
    Meyers, Vincent
    2023 IEEE 31ST ANNUAL INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, FCCM, 2023, : 239 - 241