Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder

被引:0
|
作者
Tabaeifard, Maryam [1 ]
Jahanian, Ali [1 ]
机构
[1] Shahid Beheshti Univ, Fac Comp Sci & Engn, Tehran, Iran
关键词
Cross; -Device; Deep Learning; Hardware Security; Side-Channel; Attack;
D O I
10.22042/isecure.2023.187517
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel Analysis (SCA) attacks are effective methods for extracting encryption keys, and with deep learning (DL) techniques, much stronger attacks have been carried out on victim devices. However, carrying out this kind of attack is much more challenging in cross-device attacks when the profiling device and target device are similar but not the same, which can cause the attack to fail. We also reached this conclusion when using only DL-SCA attack on our cross-devise (Atmega microcontroller devices). Due to different processes that lead to significant device-to-device variations, the accuracy of the attack was, on average, only 23%. In this paper, we proposed a method for a real attack on cross-devices using pre-processing methods based on a combination of DL-based Autoencoder and Gaussian low-pass filter (GLPF). According to our analysis results, the accuracy of the attack using only deep learning-based Autoencoder increased to 70% on average, and it improved up to 82% by adding the GLPF technique. The results also showed that combining DL-based autoencoder and GLPF can lead to a successful attack with a maximum of 300 power traces from the victim device.
引用
收藏
页码:149 / 158
页数:10
相关论文
共 50 条
  • [21] Multi-Source Training Deep-Learning Side-Channel Attacks
    Wang, Huanyu
    Forsmark, Sebastian
    Brisfors, Martin
    Dubrova, Elena
    2020 IEEE 50TH INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL 2020), 2020, : 58 - 63
  • [22] Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks
    Kim, Hodong
    Hahn, Changhee
    Kim, Hyunwoo J.
    Shin, Youngjoo
    Hur, Junbeom
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1672 - 1686
  • [23] Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies
    Wang, Chenggang
    Ninan, Mabon
    Reilly, Shane
    Ward, Joel
    Hawkins, William
    Wang, Boyang
    Emmert, John M.
    PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, 2023, : 227 - 238
  • [24] TripletPower: Deep-Learning Side-Channel Attacks over Few Traces
    Wang, Chenggang
    Dani, Jimmy
    Reilly, Shane
    Brownfield, Austen
    Wang, Boyang
    Emmert, John M.
    2023 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2023, : 167 - 178
  • [25] A Comparison of Deep Learning Approaches for Power-Based Side-Channel Attacks
    Capoferri, Roberto
    Barenghi, Alessandro
    Breveglieri, Luca
    Izzo, Niccolo
    Pelosi, Gerardo
    SECURE IT SYSTEMS, NORDSEC 2024, 2025, 15396 : 101 - 120
  • [26] Side-channel attacks and learning-vector quantization
    Saeedi, Ehsan
    Kong, Yinan
    Hossain, Md. Selim
    Frontiers of Information Technology and Electronic Engineering, 2017, 18 (04): : 511 - 518
  • [27] Side-channel attacks and learning-vector quantization
    Saeedi, Ehsan
    Kong, Yinan
    Hossain, Md. Selim
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (04) : 511 - 518
  • [28] DEVIOUS: Device-Driven Side-Channel Attacks on the IOMMU
    Kim, Taehun
    Park, Hyeongjin
    Lee, Seokmin
    Shin, Seunghee
    Hur, Junbeom
    Shin, Youngjoo
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 2288 - 2305
  • [29] Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder
    Hu, Fanliang
    Shen, Jian
    Vijayakumar, Pandi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2051 - 2065
  • [30] Side-channel attacks and learning-vector quantization
    Ehsan Saeedi
    Yinan Kong
    Md. Selim Hossain
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 511 - 518