Deep-Learning Side-Channel Attack Against STM32 Implementation of AES
2021 (English)In: 2021 International Conference On Computational Science And Computational Intelligence (CSCI 2021), Institute of Electrical and Electronics Engineers (IEEE) , 2021, p. 844-847Conference paper, Published paper (Refereed)
Abstract [en]
Deep-Learning Side-Channel Attacks (DLSCAs) have become a realistic threat to cryptographic algorithms, such as Advanced Encryption Standard (AES). Since the encryption has to run in hardware at some point to actually do things, there might be some unintentional physical leakage, such as the different amount of power consumed by the victim device. By using deep-learning models to analyze the power traces, the attacker is able to derive the secret key. In this project, we implement a real deep-learning based attack to against a STM32 implementation of AES. We apply four different types of neural networks, MLP, CNN, LSTM and RNN, to classify traces. Afterwards, we evaluate to which extent different types of models could make the attack more efficient.
Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2021. p. 844-847
Keywords [en]
Side-channel attack, MLP, CNN, LSTM, RNN
National Category
Computer Engineering Computer Sciences Information Systems
Identifiers
URN: urn:nbn:se:kth:diva-316735DOI: 10.1109/CSCI54926.2021.00030ISI: 000832229300148Scopus ID: 2-s2.0-85133913927OAI: oai:DiVA.org:kth-316735DiVA, id: diva2:1691388
Conference
International Conference on Computational Science and Computational Intelligence (CSCI), DEC 15-17, 2021, Las Vegas, NV
Note
Part of proceedings: ISBN 978-1-6654-5841-2, QC 20220830
2022-08-302022-08-302022-09-07Bibliographically approved