Side-channel analysis based on Siamese neural network

被引:1
|
作者
Li, Di [1 ,2 ]
Li, Lang [1 ,2 ]
Ou, Yu [1 ,2 ]
机构
[1] Hengyang Normal Univ, Coll Comp Sci & Technol, Hengyang 421002, Peoples R China
[2] Hunan Prov Key Lab Intelligent Informat Proc & App, Hengyang 421002, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 04期
关键词
Side-channel analysis; Deep learning; Siamese neural network; Information security; ARTIFICIAL-INTELLIGENCE; ATTACKS;
D O I
10.1007/s11227-023-05631-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the combination of deep learning and side-channel analysis has received extensive attention. Previous research has shown that the key recovery problem can be transformed into a classification problem. The performance of these models strongly depends on the size of the dataset and the number of instances in each target class. The training time is very long. In this paper, the key recovery problem is transformed into a similarity measurement problem in Siamese neural networks. We use simulated power traces and true power traces to form power pairs to augment data and simplify key recovery steps. The trace pairs are selected based on labels and added to the training to improve model performance. The model adopts a Siamese, CNN-based architecture, and it can evaluate the similarity between the inputs. The correct key is revealed by the similarity of different trace pairs. In experiments, three datasets are used to evaluate our method. The results show that the proposed method can be successfully trained with 1000 power traces and has excellent attack efficiency and training speed.
引用
收藏
页码:4423 / 4450
页数:28
相关论文
共 50 条
  • [21] Striving for understanding: Deconstructing neural networks in side-channel analysis
    Chen, Yimeng
    Wang, Bo
    Su, Changshan
    Li, Ao
    Li, Gen
    Tang, Yuxing
    PATTERN RECOGNITION, 2025, 162
  • [22] Side-channel attacks based on attention mechanism and multi-scale convolutional neural network
    He, Pengfei
    Zhang, Ying
    Gan, Han
    Ma, Jianfei
    Zhang, Hongxin
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [23] γ-Knife: Extracting Neural Network Architecture Through Software-Based Power Side-Channel
    Ryu, Dohyun
    Kim, Yerim
    Hur, Junbeom
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2686 - 2703
  • [24] A Threshold Implementation-Based Neural Network Accelerator with Power and Electromagnetic Side-Channel Countermeasures
    Maji S.
    Banerjee U.
    Fuller S.H.
    Chandrakasan A.P.
    IEEE Journal of Solid-State Circuits, 2023, 58 (01) : 141 - 154
  • [25] Side-Channel Analysis of Keymill
    Dobraunig, Christoph
    Eichlseder, Maria
    Korak, Thomas
    Mendel, Florian
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 138 - 152
  • [26] On XTR and side-channel analysis
    Page, D
    Stam, M
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 54 - 68
  • [27] On XTR and side-channel analysis
    Page, Daniel
    Stam, Martijn
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3357 : 54 - 68
  • [28] Network Encrypted Traffic Side-channel Analysis on Chinese Search
    Li Ding
    Lin Wei
    Lu Bin
    Zhu Yuefei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (05) : 1763 - 1772
  • [29] Side Channel Analysis Based on Convolutional Neural Network Filtering
    Zhang, Li
    Wang, Yi
    2024 2ND INTERNATIONAL CONFERENCE ON MOBILE INTERNET, CLOUD COMPUTING AND INFORMATION SECURITY, MICCIS 2024, 2024, : 188 - 194
  • [30] Learning-based Side-Channel Analysis on PIPO
    Woo, Ji-Eun
    Han, Jaeseung
    Kim, Yeon-Jae
    Mun, Hye-Won
    Lim, Seonghyuck
    Lee, Tae-Ho
    An, Seong-Hyun
    Kim, Soo-Jin
    Han, Dong-Guk
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 308 - 321