Multi-label Deep Learning based Side Channel Attack

In this paper, a novel side channel attack method with multi-label deep learning is proposed, and it surpasses the state-of-the-art result in ASCAD benchmark dataset. Our experimental results show that an ingenious modification of the output layer of a neural network can bring several times improvement of attack performance than the original model, even dozens of times when dealing with unaligned traces. In fact, the masked AES implementation of ASCAD only requires about 150, 250 and 350 traces to break respectively, when traces are manually desynchronized with our multi-label classification model. Our model can be considered as an ensemble learning method using the integration of monobit models based on the independence assumption of bits in the intermediate value.

[1]  Benjamin Timon,et al.  Non-Profiled Deep Learning-Based Side-Channel Attacks , 2019, IACR Cryptol. ePrint Arch..

[2]  Cécile Canovas,et al.  Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database , 2018, IACR Cryptol. ePrint Arch..

[3]  Wim Lamotte,et al.  Improving CEMA using Correlation Optimization , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[4]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[5]  Axel Legay,et al.  On the Performance of Deep Learning for Side-channel Analysis , 2018, IACR Cryptol. ePrint Arch..

[6]  J. Jaffe,et al.  Side Channel Cryptanalysis Using Machine Learning Using an SVM to recover DES keys from a smart card . , 2012 .

[7]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[8]  Emmanuel Prouff,et al.  Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.

[9]  Guang Yang,et al.  Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations , 2018, CARDIS.

[10]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[11]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[12]  Zdenek Martinasek,et al.  Innovative Method of the Power Analysis , 2013 .

[13]  Tim Güneysu,et al.  Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery , 2019, IACR Cryptol. ePrint Arch..

[14]  Yoav Freund,et al.  A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.

[15]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..

[16]  Annelie Heuser,et al.  The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations , 2018, IACR Cryptol. ePrint Arch..

[17]  Emmanuel Prouff,et al.  Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.

[18]  Jean-Jacques Quisquater,et al.  ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.

[19]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[20]  Adi Shamir,et al.  Acoustic Cryptanalysis , 2017, Journal of Cryptology.

[21]  Min-Ling Zhang,et al.  A Review on Multi-Label Learning Algorithms , 2014, IEEE Transactions on Knowledge and Data Engineering.

[22]  Rob Fergus,et al.  Visualizing and Understanding Convolutional Networks , 2013, ECCV.

[23]  Jean-Pierre Seifert,et al.  Simple photonic emission analysis of AES , 2013, Journal of Cryptographic Engineering.

[24]  Jean-Pierre Seifert,et al.  Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us , 2012, CHES.

[25]  Olivier Markowitch,et al.  Side channel attack: an approach based on machine learning , 2011 .

[26]  Alexander Binder,et al.  On Pixel-Wise Explanations for Non-Linear Classifier Decisions by Layer-Wise Relevance Propagation , 2015, PloS one.

[27]  Andrew Zisserman,et al.  Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps , 2013, ICLR.