LD-PA: Distilling Univariate Leakage for Deep Learning-Based Profiling Attacks

IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS IEEE Transactions on Information Forensics and Security Pub Date : 2024-11-04 DOI:10.1109/TIFS.2024.3490782
Chong Xiao;Ming Tang;Sengim Karayalcin;Wei Cheng
{"title":"LD-PA: Distilling Univariate Leakage for Deep Learning-Based Profiling Attacks","authors":"Chong Xiao;Ming Tang;Sengim Karayalcin;Wei Cheng","doi":"10.1109/TIFS.2024.3490782","DOIUrl":null,"url":null,"abstract":"The deep learning-based profiling attacks have received significant attention for their potential against masking-protected devices. Currently, additional capabilities like exploiting only a segment of the side-channel traces or having knowledge of the specific countermeasure scheme have been granted to attackers during the profiling phase. In case either capability is removed, a practical profiling attack faces great difficulty and complexity. To address this challenge, we propose an efficient and scheme-agnostic Leakage Distillation-based Profiling Attack (LD-PA). By distilling univariate leakage from a reference, we can train an encoder that extracts multivariate leakage from raw traces and transforms it into an effective representation (transitional leakage). An indirect connection between multivariate leakage and the target variable is established by bridging through the transitional leakage, thereby facilitating the inference of leaked values. Remarkably, LD-PA achieves successful attacks on multiple public datasets using a simple multilayer perceptron (MLP) without necessitating an exhaustive hyperparameter search, while its performance is competitive with state-of-the-art methods. Simultaneously, we delve into the nature of transitional leakage, confirming the existence of combined leakage. This, in turn, validates that the guidance from univariate leakage references aids in the combination of multivariate leakage. Besides that, each component of the multivariate leakage is extracted and stacked in a highly aligned manner. Moreover, we explored several factors impacting LD-PA performance, covering scenarios with limited profiling traces, noisy references, alternative references, and hyperparameter tuning.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"17-30"},"PeriodicalIF":8.0000,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10741549/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

The deep learning-based profiling attacks have received significant attention for their potential against masking-protected devices. Currently, additional capabilities like exploiting only a segment of the side-channel traces or having knowledge of the specific countermeasure scheme have been granted to attackers during the profiling phase. In case either capability is removed, a practical profiling attack faces great difficulty and complexity. To address this challenge, we propose an efficient and scheme-agnostic Leakage Distillation-based Profiling Attack (LD-PA). By distilling univariate leakage from a reference, we can train an encoder that extracts multivariate leakage from raw traces and transforms it into an effective representation (transitional leakage). An indirect connection between multivariate leakage and the target variable is established by bridging through the transitional leakage, thereby facilitating the inference of leaked values. Remarkably, LD-PA achieves successful attacks on multiple public datasets using a simple multilayer perceptron (MLP) without necessitating an exhaustive hyperparameter search, while its performance is competitive with state-of-the-art methods. Simultaneously, we delve into the nature of transitional leakage, confirming the existence of combined leakage. This, in turn, validates that the guidance from univariate leakage references aids in the combination of multivariate leakage. Besides that, each component of the multivariate leakage is extracted and stacked in a highly aligned manner. Moreover, we explored several factors impacting LD-PA performance, covering scenarios with limited profiling traces, noisy references, alternative references, and hyperparameter tuning.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
LD-PA:为基于深度学习的剖析攻击提取单变量泄密信息
基于深度学习的分析攻击因其对屏蔽保护设备的潜在攻击而受到广泛关注。目前,在分析阶段,攻击者已经获得了额外的能力,比如只利用一小段侧信道跟踪或了解特定的对策方案。在移除任何一种功能的情况下,实际的分析攻击将面临巨大的困难和复杂性。为了应对这一挑战,我们提出了一种高效且与方案无关的基于泄漏蒸馏的分析攻击(LD-PA)。通过从参考中提取单变量泄漏,我们可以训练一个编码器,该编码器从原始轨迹中提取多变量泄漏并将其转换为有效的表示(过渡泄漏)。通过过渡泄漏的桥接,建立了多元泄漏与目标变量之间的间接联系,便于泄漏值的推断。值得注意的是,LD-PA使用简单的多层感知器(MLP)实现了对多个公共数据集的成功攻击,而不需要穷尽的超参数搜索,而其性能与最先进的方法相竞争。同时,对过渡泄漏的性质进行了探讨,证实了复合泄漏的存在。这反过来又验证了来自单变量泄漏参考的指导有助于多变量泄漏的组合。此外,多元泄漏的每个分量被提取并以高度对齐的方式堆叠。此外,我们还探讨了影响LD-PA性能的几个因素,包括有限分析轨迹、噪声参考、替代参考和超参数调优的场景。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
期刊最新文献
CShard: Blockchain Sharding via Repairable Fountain Codes and the Paradigm for Sharding Design Frequency Hopping Waveform Design for Secure Integrated Sensing and Communications AtomXross: Towards General Cross-Chain Transaction Neural Architecture Search based Global-local Vision Mamba for Palm-Vein Recognition Differentially Private Zeroth-Order Methods for Scalable Large Language Model Fine-tuning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1