Side-Channel Attacks Based on Collaborative Learning

Side-channel attacks based on supervised learning require that the attacker have complete control over the cryptographic device and obtain a large number of labeled power traces. However, in real life, this requirement is usually not met. In this paper, an attack algorithm based on collaborative learning is proposed. The algorithm only needs to use a small number of labeled power traces to cooperate with the unlabeled power trace to realize the attack to cryptographic device. By experimenting with the DPA contest V4 dataset, the results show that the algorithm can improve the accuracy by about 20% compared with the pure supervised learning in the case of using only 10 labeled power traces.

[1]  Yan Zhou,et al.  Enhancing Supervised Learning with Unlabeled Data , 2000, ICML.

[2]  John Platt,et al.  Probabilistic Outputs for Support vector Machines and Comparisons to Regularized Likelihood Methods , 1999 .

[3]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[4]  Cédric Meuter,et al.  Semi-Supervised Template Attack , 2013, COSADE.

[5]  Zhi-Hua Zhou,et al.  Disagreement-based Semi-supervised Learning , 2013 .

[6]  Elisabeth Oswald,et al.  Practical Template Attacks , 2004, WISA.

[7]  Sylvain Guilley,et al.  RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[8]  Avrim Blum,et al.  The Bottleneck , 2021, Monopsony Capitalism.

[9]  Olivier Markowitch,et al.  A machine learning approach against a masked AES , 2014, Journal of Cryptographic Engineering.

[10]  Werner Schindler,et al.  How to Compare Profiled Side-Channel Attacks? , 2009, ACNS.

[11]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[12]  Zhi-Hua Zhou,et al.  Tri-training: exploiting unlabeled data using three classifiers , 2005, IEEE Transactions on Knowledge and Data Engineering.

[13]  Vladimir Cherkassky,et al.  The Nature Of Statistical Learning Theory , 1997, IEEE Trans. Neural Networks.

[14]  Olivier Markowitch,et al.  A Machine Learning Approach Against a Masked AES , 2013, CARDIS.

[15]  Rusty O. Baldwin,et al.  Random Forest profiling attack on advanced encryption standard , 2014, Int. J. Appl. Cryptogr..

[16]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[17]  Joos Vandewalle,et al.  Machine learning in side-channel analysis: a first study , 2011, Journal of Cryptographic Engineering.

[18]  Christof Paar,et al.  Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods , 2007, ESORICS.

[19]  Christof Paar,et al.  A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.