Side-Channel Attacks Based on Collaborative Learning

被引:2
|
作者
Liu, Biao [1 ]
Ding, Zhao [2 ]
Pan, Yang [1 ]
Li, Jiali [2 ]
Feng, Huamin [1 ,2 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing, Peoples R China
[2] Xidian Univ, Xian 100070, Shaanxi, Peoples R China
来源
DATA SCIENCE, PT 1 | 2017年 / 727卷
关键词
Side-channel attacks; Supervised learning; Collaborative learning; Power trace; AES;
D O I
10.1007/978-981-10-6385-5_46
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Side-channel attacks based on supervised learning require that the attacker have complete control over the cryptographic device and obtain a large number of labeled power traces. However, in real life, this requirement is usually not met. In this paper, an attack algorithm based on collaborative learning is proposed. The algorithm only needs to use a small number of labeled power traces to cooperate with the unlabeled power trace to realize the attack to cryptographic device. By experimenting with the DPA contest V4 dataset, the results show that the algorithm can improve the accuracy by about 20% compared with the pure supervised learning in the case of using only 10 labeled power traces.
引用
收藏
页码:549 / 557
页数:9
相关论文
共 50 条
  • [1] Side-channel analysis attacks based on deep learning network
    OU Yu
    LI Lang
    [J]. Frontiers of Computer Science, 2022, 16 (02)
  • [2] Side-channel analysis attacks based on deep learning network
    Yu Ou
    Lang Li
    [J]. Frontiers of Computer Science, 2022, 16
  • [3] Cache side-channel attacks detection based on machine learning
    Tong, Zhongkai
    Zhu, Ziyuan
    Wang, Zhanpeng
    Wang, Limin
    Zhang, Yusha
    Liu, Yuxin
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 920 - 927
  • [4] Side-channel analysis attacks based on deep learning network
    Ou, Yu
    Li, Lang
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (02)
  • [5] Side-Channel Attacks and Machine Learning Approach
    Levina, Alia
    Sleptsova, Daria
    Zaitsev, Oleg
    [J]. 2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 181 - 186
  • [6] Side-channel attacks and learning-vector quantization
    Saeedi, Ehsan
    Kong, Yinan
    Hossain, Md. Selim
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (04) : 511 - 518
  • [7] Side-channel attacks and learning-vector quantization
    Saeedi, Ehsan
    Kong, Yinan
    Hossain, Md. Selim
    [J]. Frontiers of Information Technology and Electronic Engineering, 2017, 18 (04): : 511 - 518
  • [8] Side-channel attacks and learning-vector quantization
    Ehsan Saeedi
    Yinan Kong
    Md. Selim Hossain
    [J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 511 - 518
  • [9] Thwarting Side-Channel Attacks
    Edwards, Chris
    [J]. COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [10] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    [J]. INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190