skip to main content
10.1145/3489517.3530517acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

AL-PA: cross-device profiled side-channel attack using adversarial learning

Published: 23 August 2022 Publication History

Abstract

In this paper, we focus on the portability issue in profiled side-channel attacks (SCAs) that arises due to significant device-to-device variations. Device discrepancy is inevitable in realistic attacks, but it is often neglected in research works. In this paper, we identify such device variations and take a further step towards leveraging the transferability of neural networks. We propose a novel adversarial learning-based profiled attack (AL-PA), which enables our neural network to learn device-invariant features. We evaluated our strategy on eight XMEGA microcontrollers. Without the need for target-specific preprocessing and multiple profiling devices, our approach has outperformed the state-of-the-art methods.

References

[1]
Timo Bartkewitz and Kerstin Lemke-Rust. 2012. Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines. In Proceedings of the 11th International Conference on Smart Card Research and Advanced Application (CARDIS '2012, Vol. 7771), Stefan Mangard (Ed.). Springer, 263--276.
[2]
Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, and Ritu Ranjan Shrivastwa. 2020. Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. In Proceedings of the 27th Annual Network and Distributed System Security Symposium. The Internet Society.
[3]
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, and Zakaria Najm. 2013. NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. IACR Cryptol. ePrint Arch. (2013), 717.
[4]
Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff. 2017. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing. In Proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems (CHES '17, Vol. 10529). Springer, 45--68.
[5]
Pei Cao, Chi Zhang, Xiangjun Lu, and Dawu Gu. 2021. Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021, 4 (2021), 27--56.
[6]
Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. 2002. Template Attacks. In Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES '2002, Vol. 2523). Springer, 13--28.
[7]
Marios O. Choudary and Markus G. Kuhn. 2018. Efficient, Portable Template Attacks. IEEE Trans. Inf. Forensics Secur. 13, 2 (2018), 490--501.
[8]
Omar Choudary and Markus G. Kuhn. 2014. Template Attacks on Different Devices. In Proceedings of the 5th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE '2014, Vol. 8622), Emmanuel Prouff (Ed.). Springer, 179--198.
[9]
Debayan Das, Anupam Golder, Josef Danial, Santosh Ghosh, Arijit Raychowdhury, and Shreyas Sen. 2019. X-DeepSCA: Cross-Device Deep Learning Side Channel Attack. In Proceedings of the 56th Annual Design Automation Conference. ACM, 134.
[10]
M. Abdelaziz Elaabid and Sylvain Guilley. 2012. Portability of templates. J. Cryptogr. Eng. 2, 1 (2012), 63--74.
[11]
Christophe Genevey-Metat, Benoît Gérard, and Annelie Heuser. 2020. On What to Learn: Train or Adapt a Deeply Learned Profile? IACR Cryptol. ePrint Arch. (2020), 952.
[12]
Anupam Golder, Debayan Das, Josef Danial, Santosh Ghosh, Shreyas Sen, and Arijit Raychowdhury. 2019. Practical Approaches Toward Deep-Learning-Based Cross-Device Power Side-Channel Attack. IEEE Trans. Very Large Scale Integr. Syst. 27, 12 (2019), 2720--2733.
[13]
Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron C. Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In Proceedings of the 27th Annual Conference on Neural Information Processing Systems, December 8--13, Montreal, Quebec, Canada. 2672--2680.
[14]
Annelie Heuser and Michael Zohner. 2012. Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines. In Proceedings of the Third International Workshop Constructive Side-Channel Analysis and Secure Design (COSADE '12, Vol. 7275), Werner Schindler and Sorin A. Huss (Eds.). Springer, 249--264.
[15]
Gabriel Hospodar, Benedikt Gierlichs, Elke De Mulder, Ingrid Verbauwhede, and Joos Vandewalle. 2011. Machine learning in side-channel analysis: a first study. J. Cryptogr. Eng. 1, 4 (2011), 293--302.
[16]
Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, and Alan Hanjalic. 2019. Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019, 3 (2019), 148--179.
[17]
Liran Lerman, Gianluca Bontempi, and Olivier Markowitch. 2014. Power analysis attack: an approach based on machine learning. Int. J. Appl. Cryptogr. 3, 2 (2014), 97--115.
[18]
Mingsheng Long, Zhangjie Cao, Jianmin Wang, and Michael I. Jordan. 2018. Conditional Adversarial Domain Adaptation. In Proceedings of the 31th Annual Conference on Neural Information Processing Systems. 1647--1657.
[19]
Houssem Maghrebi, Thibault Portigliatti, and Emmanuel Prouff. 2016. Breaking Cryptographic Implementations Using Deep Learning Techniques. In Proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, Vol. 10076. Springer, 3--26.
[20]
David P. Montminy, Rusty O. Baldwin, Michael A. Temple, and Eric D. Laspe. 2013. Improving cross-device attacks using zero-mean unit-variance normalization. J. Cryptogr. Eng. 3, 2 (2013), 99--110.
[21]
Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Dina Kamel, and Denis Flandre. 2011. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices. In Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '2011, Vol. 6632). Springer, 109--128.
[22]
Dhruv Thapar, Manaar Alam, and Debdeep Mukhopadhyay. 2020. TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks. IACR Cryptol. ePrint Arch. (2020), 1258.
[23]
Lennert Wouters, Victor Arribas, Benedikt Gierlichs, and Bart Preneel. 2020. Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020, 3 (2020), 147--168.
[24]
Lennert Wouters, Jan Van den Herrewegen, Flavio D. Garcia, David F. Oswald, Benedikt Gierlichs, and Bart Preneel. 2020. Dismantling DST80-based Immobiliser Systems. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020, 2 (2020), 99--127.
[25]
Honggang Yu, Haoqi Shan, Maximillian Panoff, and Yier Jin. 2021. Cross-Device Profiled Side-Channel Attacks using Meta-Transfer Learning. In Proceedings of the 58th ACM/IEEE Design Automation Conference. IEEE, 703--708.
[26]
Gabriel Zaid, Lilian Bossuet, Amaury Habrard, and Alexandre Venelli. 2020. Methodology for Efficient CNN Architectures in Profiling Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020, 1 (2020), 1--36.
[27]
Fan Zhang, Bin Shao, Guorui Xu, Bolin Yang, Ziqi Yang, Zhan Qin, and Kui Ren. 2020. From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices. In Proceedings of the 57th ACM/IEEE Design Automation Conference. IEEE, 1--6.

Cited By

View all
  • (2025)SCARefusion: Side channel analysis data restoration with diffusion modelMicroelectronics Journal10.1016/j.mejo.2024.106546156(106546)Online publication date: Feb-2025
  • (2025)Improving IIoT security: Unveiling threats through advanced side-channel analysisComputers & Security10.1016/j.cose.2024.104135148(104135)Online publication date: Jan-2025
  • (2024)Acnn: arbitrary trace attacks based on leakage area detectionInternational Journal of Information Security10.1007/s10207-024-00874-423:4(2991-3006)Online publication date: 1-Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '22: Proceedings of the 59th ACM/IEEE Design Automation Conference
July 2022
1462 pages
ISBN:9781450391429
DOI:10.1145/3489517
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 August 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adversarial networks
  2. cross-device attack
  3. side-channel attack
  4. transfer learning

Qualifiers

  • Research-article

Funding Sources

Conference

DAC '22
Sponsor:
DAC '22: 59th ACM/IEEE Design Automation Conference
July 10 - 14, 2022
California, San Francisco

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)108
  • Downloads (Last 6 weeks)8
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)SCARefusion: Side channel analysis data restoration with diffusion modelMicroelectronics Journal10.1016/j.mejo.2024.106546156(106546)Online publication date: Feb-2025
  • (2025)Improving IIoT security: Unveiling threats through advanced side-channel analysisComputers & Security10.1016/j.cose.2024.104135148(104135)Online publication date: Jan-2025
  • (2024)Acnn: arbitrary trace attacks based on leakage area detectionInternational Journal of Information Security10.1007/s10207-024-00874-423:4(2991-3006)Online publication date: 1-Aug-2024
  • (2024)It’s a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-Channel AnalysisAdvances in Cryptology – ASIACRYPT 202410.1007/978-981-96-0944-4_4(99-131)Online publication date: 10-Dec-2024
  • (2024)Domain‐Adaptive Power Profiling Analysis Strategy for the MetaverseInternational Journal of Network Management10.1002/nem.228835:1Online publication date: 10-Jul-2024
  • (2023)Noise2Clean: Cross-Device Side-Channel Traces Denoising with Unsupervised Deep LearningElectronics10.3390/electronics1204105412:4(1054)Online publication date: 20-Feb-2023
  • (2023)Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55118.2023.10133491(144-154)Online publication date: 1-May-2023
  • (2023)Autoencoder-enabled model portability for reducing hyperparameter tuning efforts in side-channel analysisJournal of Cryptographic Engineering10.1007/s13389-023-00330-414:3(475-497)Online publication date: 21-Jul-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media