Skip to main content
Top
Published in: Mobile Networks and Applications 3/2023

06-07-2023

Performance Analysis of Deep Learning Based Non-profiled Side Channel Attacks Using Significant Hamming Weight Labeling

Authors: Van-Phuc Hoang, Ngoc-Tuan Do, Van Sang Doan

Published in: Mobile Networks and Applications | Issue 3/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The use of deep learning (DL) techniques for side-channel analysis (SCA) has become increasingly popular recently. This paper assesses the application of DL to non-profiled SCA attacks on AES-128 encryption, taking into consideration various challenges, including high-dimensional data, imbalanced classes, and countermeasures. The paper proposes using a multi-layer perceptron (MLP) and a convolutional neural network (CNN) to tackle hiding protection methods, such as noise generation and de-synchronization. The paper also introduces a technique called significant Hamming weight (SHW) labeling and a dataset reconstruction approach to handle imbalanced datasets, resulting in a reduction of 30% in the number of measurements required for training. The experimental results on reconstructed dataset demonstrate improved performance in DL-based SCA compared to binary labeling techniques, especially in the face of hiding countermeasures. This leads to better results for non-profiled attacks on different targets, such as ASCAD and RISC-V microcontrollers.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Hettwer TGB, Gehrer S (2020) Applications of machine learning techniques in side-channel attacks: a survey. J Cryptogr Eng 10:135–162CrossRef Hettwer TGB, Gehrer S (2020) Applications of machine learning techniques in side-channel attacks: a survey. J Cryptogr Eng 10:135–162CrossRef
3.
go back to reference Picek S, Samiotis IP, Kim J, Heuser A, Bhasin S, Legay A (2018) On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay A, Rebeiro C, Yarom Y (eds) Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing, Cham, pp 157–176CrossRef Picek S, Samiotis IP, Kim J, Heuser A, Bhasin S, Legay A (2018) On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay A, Rebeiro C, Yarom Y (eds) Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing, Cham, pp 157–176CrossRef
4.
go back to reference Alipour A, Papadimitriou A, Beroulle V, Aerabi E, Hély D (2020) On the performance of non-profiled differential deep learning attacks against an aes encryption algorithm protected using a correlated noise generation based hiding countermeasure. In: 2020 Design, Automation Test in Europe Conference Exhibition (DATE). pp 614–617 Alipour A, Papadimitriou A, Beroulle V, Aerabi E, Hély D (2020) On the performance of non-profiled differential deep learning attacks against an aes encryption algorithm protected using a correlated noise generation based hiding countermeasure. In: 2020 Design, Automation Test in Europe Conference Exhibition (DATE). pp 614–617
5.
go back to reference Won Y-S, Han D-G, Jap D, Bhasin S, Park J-Y (2021) Non-profiled side-channel attack based on deep learning using picture trace. IEEE Access 9:22 480–22 492 Won Y-S, Han D-G, Jap D, Bhasin S, Park J-Y (2021) Non-profiled side-channel attack based on deep learning using picture trace. IEEE Access 9:22 480–22 492
6.
go back to reference Do NT, Hoang VP , Doan VS (2020) Performance analysis of non-profiled side channel attacks based on convolutional neural networks. In: 2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). pp 66–69 Do NT, Hoang VP , Doan VS (2020) Performance analysis of non-profiled side channel attacks based on convolutional neural networks. In: 2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). pp 66–69
7.
go back to reference Bae DBD, Bae JHD, Hwang JHJ (2022) Deep learning-based attacks on masked AES implementation. Journal of Internet Technology 23(4):897–902CrossRef Bae DBD, Bae JHD, Hwang JHJ (2022) Deep learning-based attacks on masked AES implementation. Journal of Internet Technology 23(4):897–902CrossRef
8.
go back to reference Lerman L, Bontempi G, Markowitch O (2014) A machine learning approach against a masked aes. Journal of Cryptographic Engineering 5:123–139CrossRef Lerman L, Bontempi G, Markowitch O (2014) A machine learning approach against a masked aes. Journal of Cryptographic Engineering 5:123–139CrossRef
9.
go back to reference Gilmore R, Hanley N, O’Neill M (2015) Neural network based attack on a masked implementation of aes. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). pp 106–111 Gilmore R, Hanley N, O’Neill M (2015) Neural network based attack on a masked implementation of aes. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). pp 106–111
10.
go back to reference Prouff E, Strullu R, Benadjila R, Cagli E, Canovas C (2018) Study of deep learning techniques for side-channel analysis and introduction to ascad database. IACR Cryptol. ePrint Arch 2018:53 Prouff E, Strullu R, Benadjila R, Cagli E, Canovas C (2018) Study of deep learning techniques for side-channel analysis and introduction to ascad database. IACR Cryptol. ePrint Arch 2018:53
11.
go back to reference Picek S, Heuser A, Jovic A, Bhasin S, Regazzoni F (2018) The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. https://ia.cr/2018/476 Picek S, Heuser A, Jovic A, Bhasin S, Regazzoni F (2018) The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. https://​ia.​cr/​2018/​476
12.
go back to reference Cagli E, Dumas C, Prouff E (2017) Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer W, Homma N (eds) Cryptographic Hardware and Embedded Systems - CHES 2017. Springer International Publishing, Cham, pp 45–68CrossRef Cagli E, Dumas C, Prouff E (2017) Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer W, Homma N (eds) Cryptographic Hardware and Embedded Systems - CHES 2017. Springer International Publishing, Cham, pp 45–68CrossRef
13.
go back to reference Hu W, Wu L, Wang A, Xie X, Zhu Z, Luo S (2014) Adaptive chosen-plaintext correlation power analysis. In: 2014 Tenth International Conference on Computational Intelligence and Security. pp 494–498 Hu W, Wu L, Wang A, Xie X, Zhu Z, Luo S (2014) Adaptive chosen-plaintext correlation power analysis. In: 2014 Tenth International Conference on Computational Intelligence and Security. pp 494–498
14.
go back to reference Do N-T, Hoang V-P (2020) An efficient side channel attack technique with improved correlation power analysis. In: Vo N-S, Hoang V-P (eds) Industrial Networks and Intelligent Systems. Springer International Publishing, Cham, pp 291–300CrossRef Do N-T, Hoang V-P (2020) An efficient side channel attack technique with improved correlation power analysis. In: Vo N-S, Hoang V-P (eds) Industrial Networks and Intelligent Systems. Springer International Publishing, Cham, pp 291–300CrossRef
15.
go back to reference Kingma D, Ba J (2014) Adam: A method for stochastic optimization. International Conference on Learning Representations 12 Kingma D, Ba J (2014) Adam: A method for stochastic optimization. International Conference on Learning Representations 12
Metadata
Title
Performance Analysis of Deep Learning Based Non-profiled Side Channel Attacks Using Significant Hamming Weight Labeling
Authors
Van-Phuc Hoang
Ngoc-Tuan Do
Van Sang Doan
Publication date
06-07-2023
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 3/2023
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-023-02128-4

Other articles of this Issue 3/2023

Mobile Networks and Applications 3/2023 Go to the issue