Deep-Learning Side-Channel Attack Against STM32 Implementation of AES
2021 (English) In: 2021 International Conference On Computational Science And Computational Intelligence (CSCI 2021), Institute of Electrical and Electronics Engineers (IEEE) , 2021, p. 844-847Conference paper, Published paper (Refereed)
Abstract [en]
Deep-Learning Side-Channel Attacks (DLSCAs) have become a realistic threat to cryptographic algorithms, such as Advanced Encryption Standard (AES). Since the encryption has to run in hardware at some point to actually do things, there might be some unintentional physical leakage, such as the different amount of power consumed by the victim device. By using deep-learning models to analyze the power traces, the attacker is able to derive the secret key. In this project, we implement a real deep-learning based attack to against a STM32 implementation of AES. We apply four different types of neural networks, MLP, CNN, LSTM and RNN, to classify traces. Afterwards, we evaluate to which extent different types of models could make the attack more efficient.
Place, publisher, year, edition, pages Institute of Electrical and Electronics Engineers (IEEE) , 2021. p. 844-847
Keywords [en]
Side-channel attack, MLP, CNN, LSTM, RNN
National Category
Computer Engineering Computer Sciences Information Systems
Identifiers URN: urn:nbn:se:kth:diva-316735 DOI: 10.1109/CSCI54926.2021.00030 ISI: 000832229300148 Scopus ID: 2-s2.0-85133913927 OAI: oai:DiVA.org:kth-316735 DiVA, id: diva2:1691388
Conference International Conference on Computational Science and Computational Intelligence (CSCI), DEC 15-17, 2021, Las Vegas, NV
Note Part of proceedings: ISBN 978-1-6654-5841-2, QC 20220830
2022-08-302022-08-302022-09-07 Bibliographically approved