Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks
- Authors
- Kwon, Donggeun; Hong, Seokhie; Kim, Heeseok
- Issue Date
- 2022
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- Deep learning; Training; Neural networks; Side-channel attacks; Measurement; Monitoring; Costs; Side-channel attacks; deep learning; non-profiled attack; differential deep learning analysis; efficient implementations
- Citation
- IEEE ACCESS, v.10, pp 5957 - 5967
- Pages
- 11
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE ACCESS
- Volume
- 10
- Start Page
- 5957
- End Page
- 5967
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/136653
- DOI
- 10.1109/ACCESS.2022.3140446
- ISSN
- 2169-3536
- Abstract
- The differential deep learning analysis proposed by Timon is the first non-profiled side-channel attack technique that uses deep learning. The technique recovers the secret key using the phenomenon of deep learning metrics. However, the proposed technique made it difficult to observe the results from the intermediate process, while the neural network had to be retrained repeatedly, as the cost of learning increased with key size. In this paper, we propose three methods to solve the aforementioned problems and any challenges resulting from solving these problems. First, we propose a modified algorithm that allows the monitoring of the metrics in the intermediate process. Second, we propose a parallel neural network architecture and algorithm that works by training a single network, with no need to re-train the same model repeatedly. Attacks were performed faster with the proposed algorithm than with the previous algorithm. Finally, we propose a novel architecture that uses shared layers to solve memory problems in parallel architecture and also helps achieve better performance. We validated the performance of our methods by presenting the results of non-profiled attacks on the benchmark database ASCAD and for a custom dataset on power consumption collected from ChipWhisperer-Lite. On the ASCAD database, our shared layers method was up to 134 times more efficient than the previous method.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Graduate School > Department of Cyber Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.