Abstract

Deep learning (DL)-based techniques have recently proven to be very successful when applied to profiled side-channel attacks (SCA). In a real-world profiled SCA scenario, attackers gain knowledge about the target device by getting access to a similar device prior to the attack. However, most state-of-the-art literature performs only proof-of-concept attacks, where the traces intended for profiling and attacking are acquired consecutively on the same fully-controlled device. This paper reminds that even a small discrepancy between the profiling and attack traces (regarded as domain discrepancy) can cause a successful single-device attack to completely fail. To address the issue of domain discrepancy, we propose a Cross-Device Profiled Attack (CDPA), which introduces an additional fine-tuning phase after establishing a pretrained model. The fine-tuning phase is designed to adjust the pre-trained network, such that it can learn a hidden representation that is not only discriminative but also domain-invariant. In order to obtain domain-invariance, we adopt a maximum mean discrepancy (MMD) loss as a constraint term of the classic cross-entropy loss function. We show that the MMD loss can be easily calculated and embedded in a standard convolutional neural network. We evaluate our strategy on both publicly available datasets and multiple devices (eight Atmel XMEGA 8-bit microcontrollers and three SAKURA-G evaluation boards). The results demonstrate that CDPA can improve the performance of the classic DL-based SCA by orders of magnitude, which significantly eliminates the impact of domain discrepancy caused by different devices.

Highlights

  • Side-channel attack (SCA) has drawn a significant amount of attention since Kocher proposed timing attack [Koc96]

  • Similar results were reported in [BCH+20]. This is reasonable since the appended profiling traces are acquired from the same device, which cannot guarantee an improved performance when we test on a target device with a different distribution

  • This paper focuses on addressing the open question of portability in profiled side-channel attacks (SCA), using transfer learning techniques

Read more

Summary

Introduction

Side-channel attack (SCA) has drawn a significant amount of attention since Kocher proposed timing attack [Koc96] It aims at retrieving the secret values of cryptographic algorithms from a device or a system through the measurement and analysis of physical information. Among all kinds of SCAs, profiled attacks play an essential role It is considered one of the most powerful SCAs, at least from the information theory point of view [CRR02]. In such a context, the attacker is able to characterize the device leakage by means of a full-knowledge (plaintexts/ciphertexts and keys) access to a device that is similar to the one under attack. We use E to denote the expected value and the condition might be subscripted by a random variable EX , or by a probability distribution E to specify under which X ∼Pr[X ].

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call