Browse > Article
http://dx.doi.org/10.13089/JKIISC.2020.30.4.527

Implementation of Instruction-Level Disassembler Based on Power Consumption Traces Using CNN  

Bae, Daehyeon (Hoseo University)
Ha, Jaecheol (Hoseo University)
Abstract
It has been found that an attacker can extract the secret key embedded in a security device and recover the operation instruction using power consumption traces which are some kind of side channel information. Many profiling-based side channel attacks based on a deep learning model such as MLP(Multi-Layer Perceptron) method are recently researched. In this paper, we implemented a disassembler for operation instruction set used in the micro-controller AVR XMEGA128-D4. After measuring the template traces on each instruction, we automatically made the pre-processing process and classified the operation instruction set using a deep learning model CNN. As an experimental result, we showed that all instructions are classified with 87.5% accuracy and some core instructions used frequently in device operation are with 99.6% respectively.
Keywords
Side-Channel Attack; Power Analysis; Deep Learning; Convolutional Neural Network(CNN); Disassembler;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," CRYPTO'99, LNCS 1666, pp. 388-397, 1999.
2 J. Park, X. Xu, Y. Jin and D. Forte, "Power-based side-channel instruction-level disassembler," Proceedings of the 55th Annual Design Automation Conference(DAC), pp. 1-6, 2018.
3 S. Wold, K. Esbensen and P. Geladi, "Principal component analysis," Chemometrics and intelligent laboratory systems, Vol. 2, No. 1-3, pp. 37-52, 1987.   DOI
4 S. Kullback and R. Leibler, "On Information and Sufficiency," The Annals of Mathematical Statistics, Vol. 22, No. 1, pp. 79-86, 1951.   DOI
5 T. Alaa, "Linear vs. quadratic discriminant analysis classifier: a tutorial," International Journal of Applied Pattern Recognition. Vol. 3 No. 2, pp. 145-180, 2016.   DOI
6 J. Pritchard, M. Stephens and P. Donnelly, "Inference of population structure using multilocus genotype data," Genetics. Vol. 155, No. 2, pp. 945-959, 2000.   DOI
7 C. Cortes and V. Vapnik, "Support-vector networks," Machine Learning, Vol. 20, No. 3, pp. 273-297, 1995.   DOI
8 V. Cristiani, M. Lecomte and T. Hiscock, "A Bit-Level Approach to Side Channel Based Disassembling," Smart Card Research and Advanced Applications(CARDIS'19), pp. 143-158, 2019.
9 ChipWhisperer${(R)}$ - NewAE Technology Inc., "chipwhisperer," Available at http://newae.com/tools/chipwhisperer/, 2017.
10 Y. LeCun, B. Leon, B. Yoshua and H. Patrick, "Gradient-based learning applied to document recognition," Proceedings of the IEEE, Vol. 86, No. 11, pp. 2278-2324, 1998.
11 F. Rosenblatt, "The perceptron: A probabilistic model for information storage and organization in the brain," Psychological Review, Vol. 65, No. 6, 1958.
12 D. Bae and J. Ha, "Implementation of Instruction-Level Disassembler Based on Power of the Microcontroller," Conference on Information Security and Cryptography - Summer 2020 (CISC-S20), Vol. 30, No. 1, pp. 649-653, 2020.