A Quantitative Analysis of Non-Profiled Side-Channel Attacks Based on Attention Mechanism
نویسندگان
چکیده
In recent years, the deep learning method has emerged as a mainstream approach to non-profiled side-channel attacks. However, most existing methods of learning-based attack rely on traditional metrics such loss and accuracy, which often suffer from unclear results in practical scenarios. Furthermore, previous studies have not fully considered properties power traces long time-series data. this paper, novel architecture is proposed, incorporates attention mechanism derives corresponding metric. By attaching after network layers, provides quantitative prediction correct key. Moreover, can effectively extract analyze features traces. The success rate different datasets at least 86%, demonstrates superior reliability compared other works when facing various countermeasures noise. Notably, even scenarios where accuracy fail provide reliable results, proposed metric remains capable accurately distinguishing
منابع مشابه
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under his control in order to build a good leakage model. Then, he takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform ...
متن کاملTowards Leakage Exploitation Optimality in Profiled Side-Channel Attacks
Template Attack is widely accepted to be one of the most powerful side-channel attacks, because it is usually assumed that one has a full knowledge of targeted crypto devices and thus be well capable of characterizing the side-channel leakages. However, the question of whether Template Attack is really optimal in terms of leakage exploitation rate is still unclear. In this paper, we present a n...
متن کاملPractical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses consist in a case-study based on sidechannel measurements acquired experimentally from a hardwired cryptographic accelerator. Therefore, with respect to previous formal analyses carried out on software measurements or on simula...
متن کاملOn the Relevance of Feature Selection for Profiled Side-channel Attacks
In the process of profiled side-channel analysis there is a number of steps one needs to make. One important step that is often conducted without a proper attention is selection of the points of interest (features) within the side-channel measurement trace. Most of the related work start with an assumption that the features are selected and various attacks are then considered and compared to fi...
متن کاملSide-channel attacks based on linear approximations
Power analysis attacks against embedded secret key cryptosystems are widely studied since the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun in 1998 where has been introduced the powerful Differential Power Analysis. The strength of DPA is such that it became necessary to develop sound and efficient countermeasures. Nowadays embedded cryptographic primitives usually integrate on...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2023
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics12153279