Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder

被引:0
|
作者
Tabaeifard, Maryam [1 ]
Jahanian, Ali [1 ]
机构
[1] Shahid Beheshti Univ, Fac Comp Sci & Engn, Tehran, Iran
关键词
Cross; -Device; Deep Learning; Hardware Security; Side-Channel; Attack;
D O I
10.22042/isecure.2023.187517
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel Analysis (SCA) attacks are effective methods for extracting encryption keys, and with deep learning (DL) techniques, much stronger attacks have been carried out on victim devices. However, carrying out this kind of attack is much more challenging in cross-device attacks when the profiling device and target device are similar but not the same, which can cause the attack to fail. We also reached this conclusion when using only DL-SCA attack on our cross-devise (Atmega microcontroller devices). Due to different processes that lead to significant device-to-device variations, the accuracy of the attack was, on average, only 23%. In this paper, we proposed a method for a real attack on cross-devices using pre-processing methods based on a combination of DL-based Autoencoder and Gaussian low-pass filter (GLPF). According to our analysis results, the accuracy of the attack using only deep learning-based Autoencoder increased to 70% on average, and it improved up to 82% by adding the GLPF technique. The results also showed that combining DL-based autoencoder and GLPF can lead to a successful attack with a maximum of 300 power traces from the victim device.
引用
收藏
页码:149 / 158
页数:10
相关论文
共 50 条
  • [31] Data Under Siege: The Quest for the Optimal Convolutional Autoencoder in Side-Channel Attacks
    van den Berg, Danny
    Slooff, Tom
    Brohet, Marco
    Papagiannopoulos, Kostas
    Regazzoni, Francesco
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [32] A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces
    Ninan, Mabon
    Nimmo, Evan
    Reilly, Shane
    Smith, Channing
    Sun, Wenhai
    Wang, Boyang
    Emmert, John M.
    PROCEEDINGS OF 27TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2024, 2024, : 630 - 643
  • [33] Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber
    Chen, Peng
    Cheng, Chi
    Li, Jinnuo
    Zhu, Tianqing
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 151 - 167
  • [34] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [35] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [36] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):
  • [37] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [38] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [39] ALScA: A Framework for Using Auxiliary Learning Side-Channel Attacks to Model PUFs
    Liu, Wei
    Zhang, Youwei
    Tang, Yonghe
    Wang, Huanwei
    Wei, Qiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 804 - 817
  • [40] Cross-Tenant Side-Channel Attacks in PaaS Clouds
    Zhang, Yinqian
    Juels, Ari
    Reiter, Michael K.
    Ristenpart, Thomas
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 990 - 1003