Single-Trace Attack Using One-Shot Learning With Siamese Network in Non-Profiled Setting
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Nayeon | - |
dc.contributor.author | Hong, Seokhie | - |
dc.contributor.author | Kim, Heeseok | - |
dc.date.accessioned | 2022-08-15T09:41:08Z | - |
dc.date.available | 2022-08-15T09:41:08Z | - |
dc.date.created | 2022-08-12 | - |
dc.date.issued | 2022 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/143258 | - |
dc.description.abstract | Recently, many studies have shown that using deep learning for side-channel attacks offers several advantages, including simplification of the attack phase and target breaking, even in protected implementations, while presenting outstanding attack performance. Power and electromagnetic analysis, which is known as the most robust attack, can be classified into profiling and non-profiling attacks. In the real world, a non-profiling attack is more ideal than a profiling attack. In particular, studies on non-profiling attacks using deep learning for asymmetric cryptosystems are rare and have shortcomings, such as a long analysis time. In this paper, we propose a novel non-profiling attack method for asymmetric cryptosystems that requires only a single trace and a reasonably short attack time to recover a full private key, overcoming the limitations of previous studies. The proposed method applies one-shot learning with a convolutional Siamese network, which is used for the first time in side-channel attacks. Thus, our proposed method can leak private keys used in a protected public-key cryptosystem with up to 100% accuracy with only one single trace in a non-profiled setting. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Single-Trace Attack Using One-Shot Learning With Siamese Network in Non-Profiled Setting | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.contributor.affiliatedAuthor | Kim, Heeseok | - |
dc.identifier.doi | 10.1109/ACCESS.2022.3180742 | - |
dc.identifier.scopusid | 2-s2.0-85131727094 | - |
dc.identifier.wosid | 000811539600001 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.10, pp.60778 - 60789 | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 10 | - |
dc.citation.startPage | 60778 | - |
dc.citation.endPage | 60789 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Side-channel attacks | - |
dc.subject.keywordAuthor | Deep learning | - |
dc.subject.keywordAuthor | Training | - |
dc.subject.keywordAuthor | Training data | - |
dc.subject.keywordAuthor | Prediction algorithms | - |
dc.subject.keywordAuthor | Noise measurement | - |
dc.subject.keywordAuthor | Licenses | - |
dc.subject.keywordAuthor | Deep learning | - |
dc.subject.keywordAuthor | ECC | - |
dc.subject.keywordAuthor | Montgomery ladder | - |
dc.subject.keywordAuthor | non-profiling attack | - |
dc.subject.keywordAuthor | one-shot learning | - |
dc.subject.keywordAuthor | side channel attack | - |
dc.subject.keywordAuthor | Siamese network | - |
dc.subject.keywordAuthor | similarity score | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.