Non-Profiled Side-Channel Attack Based on Deep Learning Using Picture Trace
نویسندگان
چکیده
Over the years, deep learning algorithms have advanced a lot and any innovation in are demonstrated benchmarked for image classification. Several other field including side-channel analysis (SCA) recently adopted with great success. In SCA, typically working 1-dimensional (1-D) data. this work, we propose unique method to improve based by converting measurements from raw-trace of 1-dimension data on float or byte into picture-formatted trace that has information position. We demonstrate why “Picturization” is more suitable compare how input hidden layers interact each raw picture form. As one potential application, use Binarized Neural Network (BNN) relies BNN's natural properties variables. addition, novel criterion attack success failure statistical confidence level rather than determination correct key using ranking system.
منابع مشابه
Side channel attack: an approach based on machine learning
In cryptography, a side channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of collecting a large amount of observations paves the way to the adoption of machine learning techniques, i.e. techniques able to extract information and patterns from large datasets. The use of statistical techniques for...
متن کاملProfiled Model Based Power Simulator for Side Channel Evaluation
An embedded cryptographic device performs operation on sensitive data and as such, is vulnerable to side-channel attacks. This forces smart-card manufacturers to carefully consider development of security mechanisms. To accelerate this procedure, the use of power and electromagnetic simulator can be relevant and saves non negligible time. Based on a high level simulator, we propose to use profi...
متن کاملHow to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under his control in order to build a good leakage model. Then, he takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform ...
متن کاملHigh-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
This paper describes high-resolution waveform matching based on a Phase-Only Correlation (POC) technique and its application for a side-channel attack. Such attacks, such as Simple Power Analysis (SPA) and Differential Power Analysis (DPA), use a statistical analysis of signal waveforms (e.g., power traces) to reduce noise and to retrieve secret information. However, the waveform data often inc...
متن کاملPower Analysis Based Side Channel Attack
Side channel attacks break the secret key of a cryptosystem using channels such as sound, heat, time and power consumption which are originally not intended to leak such information. Power analysis is a branch of side channel attacks where power consumption data is used as the side channel to attack the system. First using a device like an oscilloscope power traces are collected when the crypto...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3055833