Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber

被引:0
|
作者
Chen, Peng [1 ,2 ]
Cheng, Chi [1 ,2 ]
Li, Jinnuo [1 ,2 ]
Zhu, Tianqing [3 ]
机构
[1] China Univ Geosci, Sch Comp Sci, Wuhan, Peoples R China
[2] Hubei Key Lab Intelligent Geoinformat Proc, Wuhan, Peoples R China
[3] City Univ Macau, Fac Data Sci, Macau, Macao, Peoples R China
基金
中国国家自然科学基金;
关键词
Key Encapsulation Mechanism; Kyber; Side-Channel Attack; Portability;
D O I
10.1007/978-981-97-9053-1_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite extensive research on side-channel attacks (SCAs) against lattice-based Key Encapsulation Mechanisms (KEMs), there has been limited attention to the portability of existing deep-learning-based SCA distinguisher, especially concerning the National Institute of Standards and Technology (NIST) KEM standard Kyber. Our work addresses the portability challenges that stem from the device and measurement variations in SCAs against Kyber. We focus on the plaintext checking oracle-based SCA against Kyber, a prominent method in the field. We propose the Ablated Multiple Leakage Point Model (Ablated-MLPM) approach to optimize deep learning models, enhancing intraboard (same device with different EM probe placement) and inter-board (different devices) portability while mitigating overfitting concerns. Our contributions include the first systematic analysis of portability issues in SCAs against Kyber, highlighting their negative impact on attack efficiency. Real-world implementations are conducted on an STM32F407G board with an ARM Cortex-M4 microcontroller, using code from the well-known open-source pqm4 library. The results demonstrate that our Ablated-MLPM approach achieves more than 99% accuracy in all datasets, significantly enhancing both intra-board and inter-board portability. Furthermore, we introduce a lightweight model, Ablated-MLPM-LW, reducing the training parameters by 79.63% at the cost of requiring more queries.
引用
收藏
页码:151 / 167
页数:17
相关论文
共 50 条
  • [31] Deep Learning Side-Channel Attacks against Lightweight SCA Countermeasure RSM-AES
    Fukuda, Yuta
    Yoshida, Kota
    Hashimoto, Hisashi
    Fujino, Takeshi
    PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
  • [32] CA-SCA: Non-Profiled Deep Learning-Based Side-Channel Attacks by Using Cluster Analysis
    Fukuda, Yuta
    Yoshida, Kota
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2025, E108A (03) : 227 - 241
  • [33] How Diversity Affects Deep-Learning Side-Channel Attacks
    Wang, Huanyu
    Brisfors, Martin
    Forsmark, Sebastian
    Dubrova, Elena
    2019 IEEE NORDIC CIRCUITS AND SYSTEMS CONFERENCE (NORCAS) - NORCHIP AND INTERNATIONAL SYMPOSIUM OF SYSTEM-ON-CHIP (SOC), 2019,
  • [34] Invited Paper: Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM
    Ravi, Prasanna
    Jap, Dirmanto
    Bhasin, Shivam
    Chattopadhyay, Anupam
    2023 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2023,
  • [35] Deep Stacking Ensemble Learning Applied to Profiling Side-Channel Attacks
    Llavata, Dorian
    Cagli, Eleonora
    Eyraud, Remi
    Grosso, Vincent
    Bossuet, Lilian
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2023, 2024, 14530 : 235 - 255
  • [36] Potential of Unsupervised Deep Learning for Detection of EM Side-Channel Attacks
    Ghimire, Ashutosh
    Singh, Harshdeep
    Bhatta, Niraj Prasad
    Amsaad, Fathi
    2023 IEEE PHYSICAL ASSURANCE AND INSPECTION OF ELECTRONICS, PAINE, 2023, : 60 - 65
  • [37] Reinforcement Learning-Based Design of Side-Channel Countermeasures
    Rijsdijk, Jorai
    Wu, Lichao
    Perin, Guilherme
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2021, 2022, 13162 : 168 - 187
  • [38] On the Correctness of an Approach against Side-Channel Attacks
    Wang, Peng
    Feng, Dengguo
    Wu, Wenling
    Zhang, Liting
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 336 - +
  • [39] Guarding Machine Learning Hardware Against Physical Side-channel Attacks
    Dubey, Anuj
    Cammarota, Rosario
    Suresh, Vikram
    Aysu, Aydin
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2022, 18 (03)
  • [40] Cache side-channel attacks detection based on machine learning
    Tong, Zhongkai
    Zhu, Ziyuan
    Wang, Zhanpeng
    Wang, Limin
    Zhang, Yusha
    Liu, Yuxin
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 920 - 927