MO-DLSCA: Deep Learning Based Non-profiled Side Channel Analysis Using Multi-output Neural Networks

Differential Deep Learning Analysis (DDLA) is the first side-channel analysis (SCA) attack using deep learning (DL) in non-profiled scenarios. However, DDLA requires many training processes to distinguish the correct key. In this paper, we propose a novel SCA technique using multi-output multi-loss neural networks, which can predict all possible hypothesis keys simultaneously in a short time of the training process. Specifically, a multi-output classification (MOC) model and a multi-output regression (MOR) model are introduced. Especially, we first suggest using identity labeling for MOR model to determine the trend of the training metric for each hypothesis key in the non-profiled SCA scenario. As a result, the correct key can be distinguished easily. The efficiency of proposed model is clarified on different SCA-protected schemes, such as masking and combined hiding-masking countermeasure methods. Significantly, our approach remarkably outperforms the DDLA model and parallel network in terms of the execution time and the success rate. In addition, by using shared layers, the proposed model achieves a higher success rate of at least 25 % in the case of combined hiding-masking countermeasure.

[1]  Thien Huynh-The,et al.  MoDANet: Multi-Task Deep Network for Joint Automatic Modulation Classification and Direction of Arrival Estimation , 2022, IEEE Communications Letters.

[2]  Takeshi Fujino,et al.  Practical Aspects on Non-profiled Deep-learning Side-channel Attacks against AES Software Implementation with Two Types of Masking Countermeasures including RSM , 2021, ASHES@CCS.

[3]  Shivam Bhasin,et al.  On Use of Deep Learning for Side Channel Evaluation of Black Box Hardware AES Engine , 2021 .

[4]  Sebastián Ventura,et al.  Performing Multi-Target Regression via a Parameter Sharing-Based Deep Network , 2019, Int. J. Neural Syst..

[5]  Olivier Markowitch,et al.  Efficient Profiled Attacks on Masking Schemes , 2019, IEEE Transactions on Information Forensics and Security.

[6]  Benjamin Timon,et al.  Non-Profiled Deep Learning-Based Side-Channel Attacks , 2019, IACR Cryptol. ePrint Arch..

[7]  Ivor W. Tsang,et al.  Survey on Multi-Output Learning , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[8]  Annelie Heuser,et al.  The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations , 2018, IACR Cryptol. ePrint Arch..

[9]  Emmanuel Prouff,et al.  Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.

[10]  Concha Bielza,et al.  A survey on multi‐output regression , 2015, WIREs Data Mining Knowl. Discov..

[11]  Jian Sun,et al.  Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[12]  François-Xavier Standaert,et al.  Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note , 2012, ASIACRYPT.

[13]  Yoshua Bengio,et al.  Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.

[14]  Jean-Sébastien Coron,et al.  An Efficient Method for Random Delay Generation in Embedded Software , 2009, CHES.

[15]  Houssem Maghrebi,et al.  Deep Learning based Side Channel Attacks in Practice , 2019, IACR Cryptol. ePrint Arch..

[16]  Cécile Canovas,et al.  Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database , 2018, IACR Cryptol. ePrint Arch..