Browse > Article
http://dx.doi.org/10.13089/JKIISC.2022.32.5.987

Novel Deep Learning-Based Profiling Side-Channel Analysis on the Different-Device  

Woo, Ji-Eun (Kookmin University)
Han, Dong-Guk (Kookmin University)
Abstract
Deep learning-based profiling side-channel analysis has been many proposed. Deep learning-based profiling analysis is a technique that trains the relationship between the side-channel information and the intermediate values to the neural network, then finds the secret key of the attack device using the trained neural network. Recently, cross-device profiling side channel analysis was proposed to consider the realistic deep learning-based profiling side channel analysis scenarios. However, it has a limitation in that attack performance is lowered if the profiling device and the attack device have not the same chips. In this paper, an environment in which the profiling device and the attack device have not the same chips is defined as the different-device, and a novel deep learning-based profiling side-channel analysis on different-device is proposed. Also, MCNN is used to well extract the characteristic of each data. We experimented with the six different boards to verify the attack performance of the proposed method; as a result, when the proposed method was used, the minimum number of attack traces was reduced by up to 25 times compared to without the proposed method.
Keywords
Side-channel analysis; Deep-learning; Profiling analysis; Unsupervised domain adaptation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Trusthingz, "trusthingz", https://trusthingz.org/, Sep. 27, 2022
2 D. Kingma and J. Ba, "Adam: amethod for stochastic optimization," 3rd International Conference on Learning Representations (ICLR), May. 2015.
3 CW1173 ChipWhisperer-Lite, "ChipWhisperer-Lite", https://wiki.newae.com/CW1173_ChipWhispererLite, Sep. 27,2022
4 S. Chari, J.R. Rao, and P. Rohatgi, "Template attacks," Cryptographic Har dware and Embedded Systems, CHES 2002, LNCS 2523, pp. 13-28, Aug. 2002
5 S. Ghandali, S. Ghandali, and S. Tehranipoor, "Profiled power-analysis attacks by an efficient architectural extension of a CNN implementation.", Proceedings of the 2021 22nd International Symposium on Quality Electronic De sign (ISQED), pp. 395-400, Apr. 2021
6 R. Benadjila, E. Prouff, R. Strullu, E. Cagli, and C. Dumas, "Deep learning for side-channel analysis and introduction to ascad database," Journal of Cryptographic Engineering, vol. 10, no. 2, pp. 163-188, Jun. 2020.   DOI
7 H. Yu, H. Shan, M. Panoff, and Y. Jin, "Cross-device profiled side-channel attacks using meta-transfer learning." Proceedings of the in 2021 58th ACM/IEEE Design Automation Conference (DAC), pp. 703-708, Dec. 2021.
8 F. Standaert, T. Malkin, and M.Yung,"A unified frame work for the analysis of side-channel key recovery attacks," Advanced in Cryptology, EUROCRYPT'09, LNCS 5479, pp.443-461, Apr. 2009.
9 Y. Ganin and V. Lempitsky, "Unsupervised domain adaptation by backpropagation.", Proceedings of the 32nd International Conference on Machine Learning, vol 37, pp.1180-1189, Jul. 2015.
10 A. Gretton, A. A.J. Smola, J. Huang,M. Schmittfull, K.M. Borgwardt, andB. Scholkopf, "Covariate shift andlocal learning by distribution matching", Dataset Shift in Machine Learning, MIT Press, Cambridge, MA, USA, pp. 131-160, 2009
11 P.C. Kocher, "Timing attacks onimplementations of Diffie-Hellman, RSA, DSS, and other systems.", Advances in Cryptology, CRYPTO '96, LNCSvol 1109, pp. 104-113, Jan. 2001
12 S. Picek, I. P. Samiotis, J. Kim, A. Heuser, S. Bhasin, and A. Legay, "On the performance of convolutional neural networks for side-channel analysis," in International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), LNSC 11348, pp. 157-176, Dec. 2018.
13 P. Cao, C. Zhang, X. Lu, and D. Gu, "Cross-device profiled side-channel attack with unsupervised domain adaptation.", IACR Transactions on Cryptogr aphic Hardware and Embedded Systems, vol. 2021, no. 4, pp. 27-56, Aug. 2021.
14 Y. Won, X. Hou, D. Jap, J. Breier, and S. Bhasin, "Back to the basics: Seamless integration of side-channel preprocessing in deep neural networks." IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3215-3227. Apr. 2021   DOI