kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Multi-Leak Deep-Learning Side-Channel Analysis
Hunan Univ Sci & Technol, Sch Phys & Elect Sci, Xiangtan 411199, Hunan, Peoples R China..
KTH, School of Electrical Engineering and Computer Science (EECS), Electrical Engineering.ORCID iD: 0000-0001-9630-5869
Hunan Univ Sci & Technol, Sch Phys & Elect Sci, Xiangtan 411199, Hunan, Peoples R China..
2022 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 10, p. 22610-22621Article in journal (Refereed) Published
Abstract [en]

Deep Learning Side-Channel Attacks (DLSCAs) have become a realistic threat to implementations of cryptographic algorithms, such as Advanced Encryption Standard (AES). By utilizing deep-learning models to analyze side-channel measurements, the attacker is able to derive the secret key of the cryptographic algorithm. However, when traces have multiple leakage intervals for a specific attack point, the majority of existing works train neural networks on these traces directly, without a appropriate preprocess step for each leakage interval. This degenerates the quality of profiling traces due to the noise and non-primary components. In this paper, we first divide the multi-leaky traces into leakage intervals and train models on different intervals separately. Afterwards, we concatenate these neural networks to build the final network, which is called multi-input model. We test the proposed multi-input model on traces captured from STM32F3 microcontroller implementations of AES-128 and show a 2-fold improvement over the previous single-input attacks.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2022. Vol. 10, p. 22610-22621
Keywords [en]
Mathematical models, Software, Side-channel attacks, Deep learning, Power demand, Neural networks, Feature extraction, AES, multiple leakage, multi-input model
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:kth:diva-310194DOI: 10.1109/ACCESS.2022.3152831ISI: 000764634000001Scopus ID: 2-s2.0-85125338124OAI: oai:DiVA.org:kth-310194DiVA, id: diva2:1649545
Note

QC 20220404

Available from: 2022-04-04 Created: 2022-04-04 Last updated: 2022-06-25Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Wang, Huanyu

Search in DiVA

By author/editor
Wang, Huanyu
By organisation
Electrical Engineering
In the same journal
IEEE Access
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 48 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf