Convolutional Neural Networks for Profiled Side-channel Analysis

Recent studies have shown that deep learning algorithms are very effective for evaluating the security of embedded systems. The deep learning technique represented by Convolutional Neural Networks (CNNs) has proven to be a promising paradigm in the profiled side-channel analysis attacks. In this paper, we first proposed a novel CNNs architecture called DeepSCA. Considering that this work may be reproduced by other researchers, we conduct all experiments on the public ASCAD dataset, which provides electromagnetic traces of a masked 128-bit AES implementation. Our work confirms that DeepSCA significantly reduces the number of side-channel traces required to perform successful attacks on highly desynchronized datasets, which even outperforms the published optimized CNNs model. Additionally, we find that DeepSCA pre-trained from the synchronous traces works well in presence of desynchronization or jittering after a slight fine-tuning.

[1]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[2]  Joos Vandewalle,et al.  Machine learning in side-channel analysis: a first study , 2011, Journal of Cryptographic Engineering.

[3]  Elisabeth Oswald,et al.  Robust Profiling for DPA-Style Attacks , 2015, CHES.

[4]  S. Hou,et al.  Wavelet Support Vector Machine Algorithm in Power Analysis Attacks , 2017 .

[5]  Forrest N. Iandola,et al.  SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <1MB model size , 2016, ArXiv.

[6]  Xiangyu Zhang,et al.  ShuffleNet: An Extremely Efficient Convolutional Neural Network for Mobile Devices , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[7]  Kerstin Lemke-Rust,et al.  Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines , 2012, CARDIS.

[8]  Emmanuel Prouff,et al.  Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.

[9]  Aleksander Madry,et al.  How Does Batch Normalization Help Optimization? (No, It Is Not About Internal Covariate Shift) , 2018, NeurIPS.

[10]  Cécile Canovas,et al.  Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database , 2018, IACR Cryptol. ePrint Arch..

[11]  Yann LeCun,et al.  What is the best multi-stage architecture for object recognition? , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[12]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[13]  Cécile Canovas,et al.  Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.

[14]  Zdenek Martinasek,et al.  Optimization of Power Analysis Using Neural Network , 2013, CARDIS.

[15]  Yoshua. Bengio,et al.  Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..

[16]  Xiao-Li Meng,et al.  The Art of Data Augmentation , 2001 .

[17]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[18]  Zenghui Wang,et al.  Deep Convolutional Neural Networks for Image Classification: A Comprehensive Review , 2017, Neural Computation.

[19]  Annelie Heuser,et al.  Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines , 2012, COSADE.

[20]  Bo Chen,et al.  MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications , 2017, ArXiv.

[21]  S. Hou,et al.  Exploiting Support Vector Machine Algorithm to Break the Secret Key , 2018 .

[22]  Zdenek Martinasek,et al.  k-Nearest Neighbors Algorithm in Profiling Power Analysis Attacks , 2016 .