Deep learning-assisted and combined attack: a novel side-channel attack

被引:10
|
作者
Yu, W. [1 ]
Chen, J. [2 ]
机构
[1] Old Dominion Univ, Dept Elect & Comp Engn, Norfolk, VA 23529 USA
[2] Univ Minnesota Twin Cities, Dept Elect & Comp Engn, Minneapolis, MN 55455 USA
关键词
face recognition; learning (artificial intelligence); feedforward neural nets; feature extraction; orientation truncated centre learning; deep face recognition; centre loss; Softmax loss; interclass dispension; intraclass compactness; convolutional neural network-based face recognition; centre feature assumption; orientation truncated centre function; centre feature learning; MNIST visualisation; FGLFW benchmark; LFW benchmark; YTF benchmark; BLUFR benchmark;
D O I
10.1049/el.2018.5411
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A deep learning (DL)-assisted and combined side-channel attack (SCA) is exploited to disclose the secret key of an advanced encryption standard (AES) cryptographic circuit with a countermeasure. Different physical leakages of the protected AES cryptographic circuit such as power dissipation and electromagnetic (EM) emission are captured together at first. Then the deep neural networks are utilised to model the relationship between the power noise and the EM noise by analysing the captured power dissipation and EM emission profiles. Ultimately, a special power attack is performed on the protected AES cryptographic circuit to leak the secret key efficiently through using the EM noise to filter the power noise. As demonstrated in the results, for the conventional SCAs, the secret key of the protected AES cryptographic circuit is undisclosed to the adversary even if 1 million plain-texts are enabled. By contrast, only analysing 32,500 number of plaintexts are sufficient to leak the secret key if the DL-assisted and combined SCA is executed.
引用
收藏
页码:1114 / 1115
页数:2
相关论文
共 50 条
  • [31] Improved algebraic side-channel attack on AES
    Mohamed, Mohamed Saied Emam
    Bulygin, Stanislav
    Zohner, Michael
    Heuser, Annelie
    Walter, Michael
    Buchmann, Johannes
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (03) : 139 - 156
  • [32] Two Operands of Multipliers in Side-Channel Attack
    Sugawara, Takeshi
    Suzuki, Daisuke
    Saeki, Minoru
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2015, 2015, 9064 : 64 - 78
  • [33] Iterative side-channel cube attack on KeeLoq
    Ma, Yunfei
    Wang, Tao
    Chen, Hao
    Lei, Dong
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 53 - 56
  • [34] Efficient hybrid side-channel/machine learning attack on XOR PUFs
    Yu, Weize
    Wen, Yiming
    ELECTRONICS LETTERS, 2019, 55 (20) : 1080 - +
  • [35] A Novel Profiled Side-Channel Attack in Presence of High Algorithmic Noise
    Taha, Mostafa
    Schaumont, Patrick
    2012 IEEE 30TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2012, : 433 - 438
  • [36] A Novel Network Delay Based Side-Channel Attack: Modeling and Defense
    Ling, Zhen
    Luo, Junzhou
    Zhang, Yang
    Yang, Ming
    Fu, Xinwen
    Yu, Wei
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2390 - 2398
  • [37] SCAR-FPGA: A NOVEL SIDE-CHANNEL ATTACK RESISTANT FPGA
    Mokari, Ali
    Ghavami, Behnam
    Pedram, Hossein
    2009 5TH SOUTHERN CONFERENCE ON PROGRAMMABLE LOGIC, PROCEEDINGS, 2009, : 177 - 182
  • [38] SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud
    Tao, Xiaojie
    Wang, Liming
    Xu, Zhen
    Xie, Ru
    2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
  • [39] Adversarial Attack Protection Scalar Multiplication for WSNs Resistance Machine-Learning Side-channel Attack
    Yang, Weizhong
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (03)
  • [40] There's Always a Bigger Fish: A Clarifying Analysis of a Machine-Learning-Assisted Side-Channel Attack
    Cook, Jack
    Drean, Jules
    Behrens, Jonathan
    Yan, Mengjia
    PROCEEDINGS OF THE 2022 THE 49TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '22), 2022, : 204 - 217