Abstract
Side-channel attacks based on supervised learning require that the attacker have complete control over the cryptographic device and obtain a large number of labeled power traces. However, in real life, this requirement is usually not met. In this paper, an attack algorithm based on collaborative learning is proposed. The algorithm only needs to use a small number of labeled power traces to cooperate with the unlabeled power trace to realize the attack to cryptographic device. By experimenting with the DPA contest V4 dataset, the results show that the algorithm can improve the accuracy by about 20% compared with the pure supervised learning in the case of using only 10 labeled power traces.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Standaert, F.-X., Koeune, F., Schindler, W.: How to compare profiled side-channel attacks? In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 485–498. Springer, Heidelberg (2009). doi:10.1007/978-3-642-01957-9_30
Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Koç, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003). doi:10.1007/3-540-36400-5_3
Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30–46. Springer, Heidelberg (2005). doi:10.1007/11545262_3
Lemke-Rust, K., Paar, C.: Analyzing side channel leakage of masked implementations with stochastic methods. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 454–468. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74835-9_30
Hospodar, G., Gierlichs, B., Mulder, E.D., et al.: Machine learning in side-channel analysis: a first study. J. Crypt. Eng. 1(4), 293–302 (2011)
Patel, H., Baldwin, R.O.: Random forest profiling attack on advanced encryption standard. In. J. Appl. Crypt. 3(2), 181–194 (2014)
Karsmakers, P., Gierlichs, B., Pelckmans, K., et al.: Side channel attacks on cryptographic devices as a classification problem. Esat.kuleuven.be
Lerman, L., Medeiros, S.F., Veshchikov, N., Meuter, C., Bontempi, G., Markowitch, O.: Semi-supervised template attack. In: Prouff, E. (ed.) COSADE 2013. LNCS, vol. 7864, pp. 184–199. Springer, Heidelberg (2013). doi:10.1007/978-3-642-40026-1_12
Blum, A., Mitchell, T.: Combining labeled and unlabeled data with co-training. In: Colt, pp. 92–100 (1998)
Goldman, S.A., Zhou, Y.: Enhancing supervised learning with unlabeled data. In: Proceedings of the Seventeenth International Conference on Machine Learning, pp. 327–334 (2000)
Zhou, Z., Li, M.: Tri-training: exploiting unlabeled data using three classifiers. IEEE Trans. Knowl. Data Eng. 17(11), 1529–1541 (2005)
Zhou, Z.: Disagreement-based semi-supervised learning. Acta Autom. Sin. 39(11), 1871–1878 (2013)
Vapnik, V.: The nature of statistical learning theory. IEEE Trans. Neural Netw. 8(6), 1564 (1995)
Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20, 273–297 (1995)
Platt, J.C.: Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. Adv. Large Margin Classif. 10(4), 61–74 (2000)
Description of the masked AES of the DPA contest v4. http://www.dpacontest.org/v4/data/rsm/aes-rsm.pdf
Nassar, M., Souissi, Y., Guilley, S., et al.: RSM: a small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs. In: Design, Automation & Test in Europe Conference & Exhibition. IEEE, pp. 1173–1178 (2012)
Liu, B.: Correlation power attack on aes cipher chip with rotating masking. J. Huazhong Univ. Sci. Technol. (Nat. Sci. Ed.) 11, 112–116 (2014)
Rechberger, C., Oswald, E.: Practical template attacks. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 440–456. Springer, Heidelberg (2005). doi:10.1007/978-3-540-31815-6_35
Lerman, L., Bontempi, G., Labelowitch, O.: A machine learning approach against a masked AES. J. Crypt. Eng. 5, 123–139 (2015). International Conference Smart Card Research and Advanced Applications, Cardis
Acknowledgment
This work has been supported by the Fundamental Research Funds for the Central Universities (No. 328201507).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, B., Ding, Z., Pan, Y., Li, J., Feng, H. (2017). Side-Channel Attacks Based on Collaborative Learning. In: Zou, B., Li, M., Wang, H., Song, X., Xie, W., Lu, Z. (eds) Data Science. ICPCSEE 2017. Communications in Computer and Information Science, vol 727. Springer, Singapore. https://doi.org/10.1007/978-981-10-6385-5_46
Download citation
DOI: https://doi.org/10.1007/978-981-10-6385-5_46
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6384-8
Online ISBN: 978-981-10-6385-5
eBook Packages: Computer ScienceComputer Science (R0)