Encoding Power Traces as Images for Efficient Side-Channel Analysis

04/23/2020
by   Benjamin Hettwer, et al.
0

Side-Channel Attacks (SCAs) are a powerful method to attack implementations of cryptographic algorithms. State-of-the-art techniques such as template attacks and stochastic models usually require a lot of manual preprocessing and feature extraction by the attacker. Deep Learning (DL) methods have been introduced to simplify SCAs and simultaneously lowering the amount of required side-channel traces for a successful attack. However, the general success of DL is largely driven by their capability to classify images, a field in which they easily outperform humans. In this paper, we present a novel technique to interpret 1D traces as 2D images. We show and compare several techniques to transform power traces into images, and apply these on different implementations of the Advanced Encryption Standard (AES). By allowing the neural network to interpret the trace as an image, we are able to significantly reduce the number of required attack traces for a correct key guess.We also demonstrate that the attack efficiency can be improved by using multiple 2D images in the depth channel as an input. Furthermore, by applying image-based data augmentation, we show how the number of profiling traces is reduced by a factor of 50 while simultaneously enhancing the attack performance. This is a crucial improvement, as the amount of traces that can be recorded by an attacker is often very limited in real-life applications.

READ FULL TEXT
research
07/10/2020

Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks

Recently, many profiling side-channel attacks based on Machine Learning ...
research
10/21/2022

Virtual Triggering: a Technique to Segment Cryptographic Processes in Side Channel Traces

Side-Channel Attacks (SCAs) exploit data correla-tion in signals leaked ...
research
06/12/2023

Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning

Hardware-based cryptographic implementations utilize countermeasures to ...
research
09/13/2022

PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models

Deep Learning (DL) models increasingly power a diversity of applications...
research
01/08/2022

Horizontal Attacks against ECC: from Simulations to ASIC

In this paper we analyse the impact of different compile options on the ...
research
11/07/2022

Physics-Constrained Backdoor Attacks on Power System Fault Localization

The advances in deep learning (DL) techniques have the potential to deli...
research
01/03/2018

Power Analysis Based Side Channel Attack

Power analysis is a branch of side channel attacks where power consumpti...

Please sign up or login with your details

Forgot password? Click here to reset