Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder

被引:0
|
作者
Tabaeifard, Maryam [1 ]
Jahanian, Ali [1 ]
机构
[1] Shahid Beheshti Univ, Fac Comp Sci & Engn, Tehran, Iran
关键词
Cross; -Device; Deep Learning; Hardware Security; Side-Channel; Attack;
D O I
10.22042/isecure.2023.187517
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel Analysis (SCA) attacks are effective methods for extracting encryption keys, and with deep learning (DL) techniques, much stronger attacks have been carried out on victim devices. However, carrying out this kind of attack is much more challenging in cross-device attacks when the profiling device and target device are similar but not the same, which can cause the attack to fail. We also reached this conclusion when using only DL-SCA attack on our cross-devise (Atmega microcontroller devices). Due to different processes that lead to significant device-to-device variations, the accuracy of the attack was, on average, only 23%. In this paper, we proposed a method for a real attack on cross-devices using pre-processing methods based on a combination of DL-based Autoencoder and Gaussian low-pass filter (GLPF). According to our analysis results, the accuracy of the attack using only deep learning-based Autoencoder increased to 70% on average, and it improved up to 82% by adding the GLPF technique. The results also showed that combining DL-based autoencoder and GLPF can lead to a successful attack with a maximum of 300 power traces from the victim device.
引用
收藏
页码:149 / 158
页数:10
相关论文
共 50 条
  • [41] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [42] Combating Side-Channel Attacks Using Key Management
    Liu, Donggang
    Dong, Qi
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-5, 2009, : 3131 - 3138
  • [43] Applications of machine learning techniques in side-channel attacks: a survey
    Hettwer, Benjamin
    Gehrer, Stefan
    Gueneysu, Tim
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 135 - 162
  • [44] A Practical Side-Channel Attack of a LoRaWAN Module Using Deep Learning
    Xu, Jiming
    Tang, You
    Wang, Yujian
    Wang, Xin'an
    PROCEEDINGS OF 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (IEEE-ASID'2019), 2019, : 17 - 21
  • [45] Cache side-channel attacks detection based on machine learning
    Tong, Zhongkai
    Zhu, Ziyuan
    Wang, Zhanpeng
    Wang, Limin
    Zhang, Yusha
    Liu, Yuxin
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 920 - 927
  • [46] Empirical Evaluation of Multi-Device Profiling Side-Channel Attacks
    Hanley, Neil
    O'Neill, Maire
    Tunstall, Michael
    Marnane, William P.
    PROCEEDINGS OF THE 2014 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS (SIPS 2014), 2014, : 226 - 231
  • [47] Applications of machine learning techniques in side-channel attacks: a survey
    Benjamin Hettwer
    Stefan Gehrer
    Tim Güneysu
    Journal of Cryptographic Engineering, 2020, 10 : 135 - 162
  • [48] Non-profiled deep learning-based side-channel attacks with sensitivity analysis
    Timon, Benjamin
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (02): : 107 - 131
  • [49] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [50] Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices
    Lee, Younghan
    Jun, Sohee
    Cho, Yungi
    Han, Woorim
    Moon, Hyungon
    Paek, Yunheung
    COMPUTER SECURITY - ESORICS 2022, PT III, 2022, 13556 : 364 - 383