Improved Hybrid Approach for Side-Channel Analysis Using Efficient Convolutional Neural Network and Dimensionality Reduction

作者: Naila Mukhtar , Apostolos P. Fournaris , Tariq M. Khan , Charis Dimopoulos , Yinan Kong

DOI: 10.1109/ACCESS.2020.3029206

关键词:

摘要: Deep learning-based side channel attacks are burgeoning due to their better efficiency and performance, suppressing the traditional side-channel analysis. To launch successful attack on a particular public key cryptographic (PKC) algorithm, large number of samples per trace might need be acquired capture all minor useful details from leakage information, which increases features instance. The decreased instance-feature ratio computational complexity deep attacks, limiting efficiency. Moreover, data class imbalance can hindrance in accurate model training, leading an accuracy paradox. We propose efficient Convolutional Neural Network (CNN) based approach dimensionality dataset is reduced, then processed using proposed CNN model. In model, optimal convolutional blocks used build powerful extractors within cost limit. have also analyzed presented impact Synthetic Minority Over-sampling Technique (SMOTE) performance. that data-balancing step should mandatory for analysis scenario. provided performance-based comparative between existing learning models unprotected protected Elliptic curve (ECC) Montgomery Power ladder implementations. reduced network complexity, together with improved efficiency, promote effectively attacks.

参考文章(51)
Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Justine Wild, Horizontal and vertical side-channel attacks against secure RSA implementations the cryptographers track at the rsa conference. pp. 1- 17 ,(2013) , 10.1007/978-3-642-36095-4_1
Benoit Feix, Mylène Roussellet, Alexandre Venelli, Side-Channel Analysis on Blinded Regular Scalar Multiplications international conference on cryptology in india. pp. 3- 20 ,(2014) , 10.1007/978-3-319-13039-2_1
Junfeng Fan, Ingrid Verbauwhede, An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost Cryptography and Security: From Theory to Applications. ,vol. 6805, pp. 265- 282 ,(2012) , 10.1007/978-3-642-28368-0_18
Stan Matwin, Miroslav Kubat, Addressing the Curse of Imbalanced Training Sets: One-Sided Selection. international conference on machine learning. pp. 179- 186 ,(1997)
Amir Moradi, Statistical Tools Flavor Side-Channel Collision Attacks Advances in Cryptology – EUROCRYPT 2012. pp. 428- 445 ,(2012) , 10.1007/978-3-642-29011-4_26
Kunihiko Fukushima, Sei Miyake, Neocognitron: A Self-Organizing Neural Network Model for a Mechanism of Visual Pattern Recognition Springer, Berlin, Heidelberg. pp. 267- 285 ,(1982) , 10.1007/978-3-642-46466-9_18
Frederic Amiel, Benoit Feix, Karine Villegas, Power analysis for secret recovering and reverse engineering of public key algorithms international conference on selected areas in cryptography. pp. 110- 125 ,(2007) , 10.1007/978-3-540-77360-3_8
Pierre-Alain Fouque, Frederic Valette, The Doubling Attack - Why Upwards Is Better than Downwards cryptographic hardware and embedded systems. pp. 269- 280 ,(2003) , 10.1007/978-3-540-45238-6_22
Marcel Medwed, Elisabeth Oswald, Template Attacks on ECDSA workshop on information security applications. pp. 14- 27 ,(2009) , 10.1007/978-3-642-00306-6_2
Richard Gilmore, Neil Hanley, Maire O'Neill, Neural network based attack on a masked implementation of AES hardware oriented security and trust. pp. 106- 111 ,(2015) , 10.1109/HST.2015.7140247