Performance Analysis of Non-Profiled Side Channel Attacks Based on Convolutional Neural Networks

Ngoc-Tuan Do, Van‐Phuc Hoang, Van-Sang Doan
{"title":"Performance Analysis of Non-Profiled Side Channel Attacks Based on Convolutional Neural Networks","authors":"Ngoc-Tuan Do, Van‐Phuc Hoang, Van-Sang Doan","doi":"10.1109/APCCAS50809.2020.9301673","DOIUrl":null,"url":null,"abstract":"There are emerging issues about side channel at-tacks (SCAs) on the cryptographic devices which are widely used today for securing secret information. Recently, the neural networks have been introduced as a new promising approach to perform SCA for hardware security evaluation of cryptographic algorithms. In this work, we present a non-profiled SCA using convolutional neural networks (CNNs) on an 8-bit AVR micro-controller device running the AES-128 cryptographic algorithm. We aim to point out the practical issues that occurs in CNN based SCA methods using the aligned power traces with a large number of samples. Furthermore, a method to build a suitable dataset for CNN training is introduced. Especially, practical experiment results of the CNN based SCA methods and a comprehensive investigation on the effect of noise are also presented. These experiments are performed with the original power traces and additive Gaussian noise. The results show that the CNN based SCA with our constructed dataset provides reliable results for non-profiled attacks. However, it is also shown that the Gaussian noise added on power traces becomes a serious problem.","PeriodicalId":127075,"journal":{"name":"2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APCCAS50809.2020.9301673","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

There are emerging issues about side channel at-tacks (SCAs) on the cryptographic devices which are widely used today for securing secret information. Recently, the neural networks have been introduced as a new promising approach to perform SCA for hardware security evaluation of cryptographic algorithms. In this work, we present a non-profiled SCA using convolutional neural networks (CNNs) on an 8-bit AVR micro-controller device running the AES-128 cryptographic algorithm. We aim to point out the practical issues that occurs in CNN based SCA methods using the aligned power traces with a large number of samples. Furthermore, a method to build a suitable dataset for CNN training is introduced. Especially, practical experiment results of the CNN based SCA methods and a comprehensive investigation on the effect of noise are also presented. These experiments are performed with the original power traces and additive Gaussian noise. The results show that the CNN based SCA with our constructed dataset provides reliable results for non-profiled attacks. However, it is also shown that the Gaussian noise added on power traces becomes a serious problem.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于卷积神经网络的非侧信道攻击性能分析
目前广泛用于保密信息安全的加密设备上的侧信道攻击(sca)问题日益突出。近年来,神经网络作为一种新的有前途的方法被引入到执行SCA来对加密算法的硬件安全性进行评估。在这项工作中,我们在运行AES-128加密算法的8位AVR微控制器设备上使用卷积神经网络(cnn)提出了一个非配置SCA。我们的目标是指出在使用具有大量样本的对齐电源走线的基于CNN的SCA方法中出现的实际问题。此外,还介绍了一种构建适合CNN训练的数据集的方法。特别给出了基于CNN的SCA方法的实际实验结果,并对噪声的影响进行了全面研究。这些实验是在原始功率走线和加性高斯噪声条件下进行的。结果表明,基于CNN的SCA与我们构建的数据集为非分析攻击提供了可靠的结果。然而,在功率走线上添加的高斯噪声也成为一个严重的问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
"Truth from Practice, Learning beyond Teaching" Exploration in Teaching Analog Integrated Circuit 100 MHz Random Number Generator Design Using Interleaved Metastable NAND/NOR Latches* Performance Analysis of Non-Profiled Side Channel Attacks Based on Convolutional Neural Networks A Self-coupled DT MASH ΔΣ Modulator with High Tolerance to Noise Leakage An Energy-Efficient Time-Domain Binary Neural Network Accelerator with Error-Detection in 28nm CMOS
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1