Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks

Authors
Kwon, DonggeunHong, SeokhieKim, Heeseok
Issue Date
2022
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Deep learning; Training; Neural networks; Side-channel attacks; Measurement; Monitoring; Costs; Side-channel attacks; deep learning; non-profiled attack; differential deep learning analysis; efficient implementations
Citation
IEEE ACCESS, v.10, pp.5957 - 5967
Indexed
SCIE
SCOPUS
Journal Title
IEEE ACCESS
Volume
10
Start Page
5957
End Page
5967
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/136653
DOI
10.1109/ACCESS.2022.3140446
ISSN
2169-3536
Abstract
The differential deep learning analysis proposed by Timon is the first non-profiled side-channel attack technique that uses deep learning. The technique recovers the secret key using the phenomenon of deep learning metrics. However, the proposed technique made it difficult to observe the results from the intermediate process, while the neural network had to be retrained repeatedly, as the cost of learning increased with key size. In this paper, we propose three methods to solve the aforementioned problems and any challenges resulting from solving these problems. First, we propose a modified algorithm that allows the monitoring of the metrics in the intermediate process. Second, we propose a parallel neural network architecture and algorithm that works by training a single network, with no need to re-train the same model repeatedly. Attacks were performed faster with the proposed algorithm than with the previous algorithm. Finally, we propose a novel architecture that uses shared layers to solve memory problems in parallel architecture and also helps achieve better performance. We validated the performance of our methods by presenting the results of non-profiled attacks on the benchmark database ASCAD and for a custom dataset on power consumption collected from ChipWhisperer-Lite. On the ASCAD database, our shared layers method was up to 134 times more efficient than the previous method.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Cyber Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE