Skip to main content

Research on Feature Selection Algorithm of Energy Curve

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2023)

Abstract

Energy analysis attack is a side channel attack, which collects and analyzes the power leakage information in the operation process of cryptographic chip, and then recovers the correct key. In the process of energy analysis attack, the collected power leakage information has many feature dimensions and a large amount of data. Putting all the features into the algorithm will bring dimension disaster. Therefore, choosing the characteristic points of the energy curve is of great significance for the success of the attack. Firstly, three kinds of feature selection methods are studied in this paper. Secondly, three energy curve feature selection algorithms are implemented: dynamic feature selection algorithm based on mutual information, feature selection algorithm based on decision tree and feature selection algorithm based on recursive feature elimination. Finally, the three feature selection results are tested and evaluated by machine learning, which shows that the subsets generated by the three algorithms have good performance and can be used for energy analysis attacks. Among the three methods, the feature selection algorithm based on decision tree has a short-time and the selected feature subset is the best.

This paper is supported by “the Fundamental Research Funds for the Central Universities” (Grant Number:328202207, 328202247, 3282023054).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kira, K., Rendell, L.A.: The feature selection problem: traditional methods and a new algorithm. In: Tenth National Conference on Artificial Intelligence,pp.129–134. AAAI Press (1992)

    Google Scholar 

  2. John, G.: Irrelevant features and the subset selection problem. In: 11th International Conference on Machine Learning (ICML-94), pp.121–129. Morgan Kaufmann (1994)

    Google Scholar 

  3. Koller, D., Sahami, M.: Toward optimal feature selection. In: 13th International Conference on Machine Learning (ICML-96), pp.284–292. Morgan Kaufmann (1996)

    Google Scholar 

  4. Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_9

    Chapter  Google Scholar 

  5. Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Koç, çK., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36400-5_3

    Chapter  Google Scholar 

  6. Gierlichs, B., Lemke-Rust, K., Paar, C.: Templates vs. stochastic methods. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 15–29. Springer, Heidelberg (2006). https://doi.org/10.1007/11894063_2

    Chapter  Google Scholar 

  7. Archambeau, C., Peeters, E., Standaert, F.-X., Quisquater, J. -J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1–14. Springer, Heidelberg (2006). https://doi.org/10.1007/11894063_1

    Chapter  Google Scholar 

  8. Czarnowski, I., Jędrzejowicz, P.: Data reduction and stacking for imbalanced data classification. J. Intell. Fuzzy Syst. 37(6), 7239–7249 (2019)

    Google Scholar 

  9. Khosla, K., Jha, I.P., Kumar, A., Kumar, V.: Local-Topology-Based Scaling for Distance Preserving Dimension Reduction Method to Improve Classification of Biomedical Data-Sets. Algorithms 13(8), 192–203 (2020)

    Article  MathSciNet  Google Scholar 

  10. Shi, Q., Pan, F., Long, F.: A review of feature selection methods. Microelectron. Comput. 39(3), 1–8 (2022)

    Google Scholar 

  11. Visalakshi, S., Radha, V.: A literature review of feature selection techniques and applications: review of feature selection in data mining. In: 2014 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–6. IEEE, Coimbatore, India (2014)

    Google Scholar 

  12. Aboudi, N.E., Benhlima, L.: Review on wrapper feature selection approaches. In: International Conference on Engineering & MIS (ICEMIS), pp. 1–5. IEEE, Agadir, Morocco (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoyi Duan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fan, X. et al. (2024). Research on Feature Selection Algorithm of Energy Curve. In: Goel, S., Nunes de Souza, P.R. (eds) Digital Forensics and Cyber Crime. ICDF2C 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 570. Springer, Cham. https://doi.org/10.1007/978-3-031-56580-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56580-9_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56579-3

  • Online ISBN: 978-3-031-56580-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics