Multi-Leak Deep-Learning Side-Channel Analysis
2022 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 10, p. 22610-22621
Article in journal (Refereed) Published
Abstract [en]
Deep Learning Side-Channel Attacks (DLSCAs) have become a realistic threat to implementations of cryptographic algorithms, such as Advanced Encryption Standard (AES). By utilizing deep-learning models to analyze side-channel measurements, the attacker is able to derive the secret key of the cryptographic algorithm. However, when traces have multiple leakage intervals for a specific attack point, the majority of existing works train neural networks on these traces directly, without a appropriate preprocess step for each leakage interval. This degenerates the quality of profiling traces due to the noise and non-primary components. In this paper, we first divide the multi-leaky traces into leakage intervals and train models on different intervals separately. Afterwards, we concatenate these neural networks to build the final network, which is called multi-input model. We test the proposed multi-input model on traces captured from STM32F3 microcontroller implementations of AES-128 and show a 2-fold improvement over the previous single-input attacks.
Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2022. Vol. 10, p. 22610-22621
Keywords [en]
Mathematical models, Software, Side-channel attacks, Deep learning, Power demand, Neural networks, Feature extraction, AES, multiple leakage, multi-input model
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:kth:diva-310194DOI: 10.1109/ACCESS.2022.3152831ISI: 000764634000001Scopus ID: 2-s2.0-85125338124OAI: oai:DiVA.org:kth-310194DiVA, id: diva2:1649545
Note
QC 20220404
2022-04-042022-04-042022-06-25Bibliographically approved