Skip to main content

Power Analysis Attack Based on BS-XGboost Scheme

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2023)

Abstract

The power attack is a type of side-channel attack that involves measuring the power consumption of a device to extract secret information. By analyzing power consumption variations, an attacker can deduce the secret key used in the operation. In a class-imbalanced dataset, where the number of samples in one class is much smaller than the other, the power consumption patterns during cryptographic operations may be different for each class. The BorderLine-SMOTE data enhancement scheme was used to generate synthetic samples near the boundaries or at a greater distance from the existing samples, and through these modifications it helps to increase the diversity of the synthetic samples and reduce the risk of overfitting. XGBoost is then used as a classifier to classify the power curves. To evaluate the efficacy of the proposed method, it was applied to the DPA V4 dataset. The results indicated that the original data, when augmented using the Borderline-SMOTE + XGBoost approach, exhibited a substantial improvement in classification precision of up to 34%, outperforming DUAN’s method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25

    Chapter  Google Scholar 

  2. Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_2

    Chapter  Google Scholar 

  3. Batina, L., Gierlichs, B., Prouff, E., Rivain, M., Standaert, F.-X., Veyrat-Charvillon, N.: Mutual information analysis: a comprehensive study. J. Cryptol.Cryptol. 24(2), 269–291 (2010). https://doi.org/10.1007/s00145-010-9084-8

    Article  MathSciNet  Google Scholar 

  4. Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Koç, çK., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36400-5_3

    Chapter  Google Scholar 

  5. Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30–46. Springer, Heidelberg (2005). https://doi.org/10.1007/11545262_3

    Chapter  Google Scholar 

  6. Heuser, A., Zohner, M.: Intelligent machine homicide. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol. 7275, pp. 249–264. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29912-4_18

    Chapter  Google Scholar 

  7. Martinasek, Z., Zeman, V., Malina, L., et al.: K-nearest neighbors algorithm in profiling power analysis attacks. Radioengineering 25(2), 365–382 (2016)

    Article  Google Scholar 

  8. Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng.Cryptogr. Eng. 10(2), 163–188 (2019). https://doi.org/10.1007/s13389-019-00220-8

    Article  Google Scholar 

  9. Perin, G., Chmielewski, U., Picek, S.: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis (2020)

    Google Scholar 

  10. Lu, X., Zhang, C., Cao, P., et al.: Pay attention to raw traces: a deep learning architecture for end-to-end profiling attacks (2021)

    Google Scholar 

  11. Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis (2019)

    Google Scholar 

  12. Moos, T., Wegener, F., Moradi, A.: DL-LA: deep learning leakage assessment: a modern roadmap for SCA evaluations. In: Cryptographic Hardware and Embedded Systems. Universitätsbibliothek der Ruhr-Universität Bochum (2021)

    Google Scholar 

  13. Duan, X., Chen, D., Fan, X., et al.: Research and Implementation on power analysis attacks for unbalanced data. Secur. Commun. Netw. 2020(3), 1–10 (2020)

    Google Scholar 

  14. Zhou, Z.: Machine Learning, pp. 29–30. Tsinghua Press, Beijing (2016)

    Google Scholar 

  15. Han, H., Wang, W.-Y., Mao, B.-H.: Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) ICIC 2005. LNCS, vol. 3644, pp. 878–887. Springer, Heidelberg (2005). https://doi.org/10.1007/11538059_91

    Chapter  Google Scholar 

  16. Chen, T., Gueslrin, G.: XGBoost: a scalable tree boosting system. In: The 22nd ACM SIGKDD International Conference, pp. 758–794. ACM, New York (2016)

    Google Scholar 

  17. http://www.dpacontest.org/home/

  18. Rodgers, L., Nicewander, W.A.: Thirteen ways to look at the correlation coefficient. Stat 42(1), 59–66 (1988)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yiran Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Y. (2024). Power Analysis Attack Based on BS-XGboost Scheme. In: Goel, S., Nunes de Souza, P.R. (eds) Digital Forensics and Cyber Crime. ICDF2C 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 571. Springer, Cham. https://doi.org/10.1007/978-3-031-56583-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56583-0_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56582-3

  • Online ISBN: 978-3-031-56583-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics