Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations

被引:1
|
作者
Gohr, Aron [1 ]
Jacob, Sven [1 ]
Schindler, Werner [1 ]
机构
[1] Bundesamt Sicherheit Informat Tech BSI, Godesberger Allee 185-189, D-53175 Bonn, Germany
来源
关键词
Power analysis; Machine learning; Deep learning; SAT solver;
D O I
10.1007/978-3-030-81652-0_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper has four main goals. First, we show how we solved the CHES 2018 AES challenge in the contest using essentially a linear classifier combined with a SAT solver and a custom error correction method. This part of the paper has previously appeared in a preprint by the current authors (e-print report 2019/094) and later as a contribution to a preprint write-up of the solutions by the winning teams (e-print report 2019/860). Second, we develop a novel deep neural network architecture for sidechannel analysis that completely breaks the AES challenge, allowing for fairly reliable key recovery with just a single trace on the unknown-device part of the CHES challenge (with an expected success rate of roughly 70% if about 100 CPU hours are allowed for the equation solving stage of the attack). This solution significantly improves upon all previously published solutions of the AES challenge, including our baseline linear solution. Third, we consider the question of leakage attribution for both the classifier we used in the challenge and for our deep neural network. Direct inspection of the weight vector of our machine learning model yields a lot of information on the implementation for our linear classifier. For the deep neural network, we test three other strategies (occlusion of traces; inspection of adversarial changes; knowledge distillation) and find that these can yield information on the leakage essentially equivalent to that gained by inspecting the weights of the simpler model. Fourth, we study the properties of adversarially generated sidechannel traces for our model. Partly reproducing recent computer vision work by Ilyas et al. in our application domain, we find that a linear classifier that generalizes to an unseen device much better than our linear baseline can be trained using only adversarial examples (fresh random keys, adversarially perturbed traces) for our deep neural network. This gives a new way of extracting human-usable knowledge from a deep side channel model while also yielding insights on adversarial examples in an application domain where relatively few sources of spurious correlations between data and labels exist. The experiments described in this paper can be reproduced using code available at https://github.com/agohr/ches2018.
引用
下载
收藏
页码:567 / 592
页数:26
相关论文
共 50 条
  • [31] Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel Attacks
    Ahmed, Amjed A.
    Hasan, Mohammad Kamrul
    Aman, Azana H.
    Safie, Nurhizam
    Islam, Shayla
    Ahmed, Fatima A.
    Ahmed, Thowiba E.
    Pandey, Bishwajeet
    Rzayeva, Leila
    IEEE Access, 2024, 12 : 188435 - 188453
  • [32] Knowledge distillation-based deep learning classification network for peripheral blood leukocytes
    Leng, Bing
    Leng, Min
    Ge, Mingfeng
    Dong, Wenfei
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2022, 75
  • [33] Defensive Distillation-Based Adversarial Attack Mitigation Method for Channel Estimation Using Deep Learning Models in Next-Generation Wireless Networks
    Catak, Ferhat Ozgur
    Kuzlu, Murat
    Catak, Evren
    Cali, Umit
    Guler, Ozgur
    IEEE ACCESS, 2022, 10 : 98191 - 98203
  • [34] Learning a classifier with very few examples: Analogy based and knowledge based generation of new examples for character recognition
    Bayoudh, S.
    Mouchere, H.
    Miclet, L.
    Anquetil, E.
    MACHINE LEARNING: ECML 2007, PROCEEDINGS, 2007, 4701 : 527 - +
  • [35] A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards
    Harrison, Joshua
    Toreini, Ehsan
    Mehrnezhad, Maryam
    2023 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW, 2023, : 270 - 280
  • [36] Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup
    Luo, Zhimin
    Zheng, Mengce
    Wang, Ping
    Jin, Minhui
    Zhang, Jiajia
    Hu, Honggang
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 791 - 801
  • [37] Recent advances in deep learning-based side-channel analysis
    Jin, Sunghyun
    Kim, Suhri
    Kim, HeeSeok
    Hong, Seokhie
    ETRI JOURNAL, 2020, 42 (02) : 292 - 304
  • [38] Label Correlation in Deep Learning-Based Side-Channel Analysis
    Wu, Lichao
    Weissbart, Leo
    Krcek, Marina
    Li, Huimin
    Perin, Guilherme
    Batina, Lejla
    Picek, Stjepan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3849 - 3861
  • [39] SoK: Deep Learning-based Physical Side-channel Analysis
    Picek, Stjepan
    Perin, Guilherme
    Mariot, Luca
    Wu, Lichao
    Batina, Lejla
    ACM COMPUTING SURVEYS, 2023, 55 (11)
  • [40] Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning
    Sun, Wei
    Yan, Zheng
    Xu, Xi
    Ding, Wenxiu
    Gao, Lijun
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 800 - 809