Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.6.1127

Non-Profiling Power Analysis Attacks Using Continuous Wavelet Transform Method  

Bae, Daehyeon (Hoseo University)
Lee, Jaewook (Hoseo University)
Ha, Jaecheol (Hoseo University)
Abstract
In the field of power analysis attacks, electrical noise and misalignment of the power consumption trace are the major factors that determine the success of the attack. Therefore, several studies have been conducted to overcome this problem, and one of them is a signal processing method based on wavelet transform. Up to now, discrete wavelet transform, which can compress the trace, has been mostly used for power side-channel power analysis because continuous wavelet transform techniques increase data size and analysis time, and there is no efficient scale selection method. In this paper, we propose an efficient scale selection method optimized for power analysis attacks. Furthermore, we show that the analysis performance can be greatly improved when using the proposed method. As a result of the CPA(Correlation Power Analysis) and DDLA(Differential Deep Learning Analysis) experiments, which are non-profiling attacks, we confirmed that the proposed method is effective for noise reduction and trace alignment.
Keywords
Implementation Attack; Hardware Security; Artificial Intelligence; Deep Learning; Wavelet Transform;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," CRYPTO'99, LNCS 1666, pp. 388-397, 1999.
2 W. Kim, K. Song, Y. Lee, H.W. Kim, and H.N. Kim, "Performance Improvement of Power Analysis Attacks based on Wavelet De-noising," The Journal of Korean Institute of Communications and Information Sciences, 35(9), pp. 1330-1342, Sep. 2010.
3 E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model," CHES'04, pp. 16-29, 2004.
4 B. Timon, "Non-profiled deep learning-based side-channel attacks with sensitivity analysis," IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 2, pp. 107-131, Feb. 2019.   DOI
5 E. Prouff, R. Strullu, R. Benadjila, E. Cagli, and C. Dumas, "Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database," IACR ePrint Archive, Available at https://eprint.iacr.org/2018/053, 2018.
6 D. Bae, and J. Ha, "Performance Metric for Differential Deep Learning Analysis," Journal of Internet Services and Information Security (JISIS), Vol. 11, No. 2, pp. 22-33, May. 2021.   DOI
7 N. Debande, Y. Souissi, M. Aabid, S. Guilley, and J. Danger, "Wavelet transform based pre-processing for side channel analysis," 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops, pp. 32-38, Dec. 2012.
8 P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," CRYPTO'96, LNCS 1109, pp. 104-113, 1996.
9 D. Kwon, S. Jin, H. Kim, and S. Hong, "Improving Non-Profiled Side-Channel Analysis Using Auto-Encoder Based Noise Reduction Preprocessing," Journal of the Korea Institute of Information Security & Cryptology, 29(3), pp. 491-501, May. 2019.   DOI
10 J. Ryoo, D. Han, S. Kim, H. Kim, T. Kim, and S. Lee, "A Proposal of Wavelet-based Differential Power Analysis Method," Journal of the Korea Institute of Information Security & Cryptology, 19(3), pp. 27-35, June. 2009.   DOI
11 R. Gwinn, M. Matties, and A. Rubin, "Wavelet Selection and Employment for Side-Channel Disassembly," arXiv ePrint Archive, Available at https://arxiv.org/abs/2107.11870, 2021.
12 D. Bae, and J. Ha, "Implementation of Instruction-Level Disassembler Based on Power Consumption Traces Using CNN," Journal of the Korea Institute of Information Security & Cryptology, 30(4), pp. 527-536, Aug. 2020.   DOI
13 J. Park, X. Xu, Y. Jin and D. Forte, "Power-based side-channel instruction-level disassembler," Proceedings of the 55th Annual Design Automation Conference(DAC), pp. 1-6, June. 2018.
14 T. Le, J. Clediere, C. Serviere, and J. Lacoume, "Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant," IEEE Transactions on Information Forensics and Security, Vol. 2, No. 4, pp. 710-720, Nov. 2007.   DOI
15 ETRI, "SCARF Dataset," Available at https://trusthingz.org/index.php/scarf-data, 2019.