EFFICIENT CNN-BASED PROFILED SIDE CHANNEL ATTACKS
نویسندگان
چکیده
Profiled side-channel attacks are now considered as powerful forms of used to break the security cryptographic devices. A recent line research has investigated a new profiled attack based on deep learning and many them have convolution neural network (CNN) architecture for attack. The effectiveness is greatly influenced by CNN architecture. However, current often been image recognition fields, choosing right architectures parameters adaption still challenging. In this paper, we propose an efficient unprotected masking-protected devices two architectures, called CNNn, CNNd respectively. Both proposed in paper property points interest power trace further determined Grey Wolf Optimization (GWO) algorithm. To verify attacks, experiments were performed set collected from Atmega8515 smart card when it performs AES-128 encryption, DPA contest v4 dataset ASCAD public
منابع مشابه
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under his control in order to build a good leakage model. Then, he takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform ...
متن کاملTowards Leakage Exploitation Optimality in Profiled Side-Channel Attacks
Template Attack is widely accepted to be one of the most powerful side-channel attacks, because it is usually assumed that one has a full knowledge of targeted crypto devices and thus be well capable of characterizing the side-channel leakages. However, the question of whether Template Attack is really optimal in terms of leakage exploitation rate is still unclear. In this paper, we present a n...
متن کاملEfficient Hamming weight-based side-channel cube attacks on PRESENT
Side-channel cube attack (SCCA) is a powerful cryptanalysis technique that combines side-channel attack and cube attack. This paper proposes several advanced techniques to improve the Hamming weight-based SCCA (HW-SCCA) on the block cipher PRESENT. The new techniques utilize non-linear equations and an iterative scheme to extract more information from leakage. The new attacks need only 2 chosen...
متن کاملProfiled Model Based Power Simulator for Side Channel Evaluation
An embedded cryptographic device performs operation on sensitive data and as such, is vulnerable to side-channel attacks. This forces smart-card manufacturers to carefully consider development of security mechanisms. To accelerate this procedure, the use of power and electromagnetic simulator can be relevant and saves non negligible time. Based on a high level simulator, we propose to use profi...
متن کاملSide channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Science and Cybernetics
سال: 2021
ISSN: ['1813-9663']
DOI: https://doi.org/10.15625/1813-9663/37/1/15418