Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Deep learning algorithms are increasingly employed to exploit side-channel information, such as power consumption and electromagnetic leakage from hardware devices, significantly enhancing attack capabilities. However, relying solely on power traces for side-channel information often requires adequate domain knowledge. To address this limitation, this work proposes a new attack scheme. Firstly, a Convolutional Neural Network (CNN)-based plaintext-extended bilinear feature fusion model is designed. Secondly, multi-model intermediate layers are fused and trained, yielding in the increase of the amount of effective information and generalization ability. Finally, the model is employed to predict the output probability of three public side-channel datasets (e.g. ASCAD, AES\(\_\)HD, and AES\(\_\)RD), and analyze the recovery key guessing entropy for each key to efficiently assess attack efficiency. Experimental results showcase that the plaintext-extended bilinear feature fusion model can effectively enhance the Side-Channel Attack (SCA) capabilities and prediction performance. Deploying the proposed method, the number of traces required for a successful attack on the ASCAD\(\_\)R dataset is significantly reduced to less than 914, representing an 70.5% reduction in traces compared to the network in Convolutional Neural Network-Visual Geometry Group (CNNVGG16) with plaintext, which incorporating plaintext features before the fully connected layer. Compared to existing solutions, the proposed scheme requires only 80% of the power traces for the attack mask design using only 75 epochs. As a result, the power of the proposed method is well proved through the different experiments and comparison processes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

No datasets were generated or analysed during the current study.

References

  1. Hettwer, B., Gehrer, S., Güneysu, T.: Applications of machine learning techniques in side-channel attacks: a survey. J. Cryptogr. Eng. 10(2), 135–162 (2020). https://doi.org/10.1007/s13389-019-00212-8

    Article  Google Scholar 

  2. Ni, L., Wang, P., Zhang, Y., Zhang, H., Li, X., Ni, L., Lv, J., Zheng, W.: Profiling side-channel attacks based on CNN model fusion. Microelectron. J. 139, 105901 (2023). https://doi.org/10.1016/j.mejo.2023.105901

    Article  Google Scholar 

  3. Gopinath, M., Sethuraman, S.C.: A comprehensive survey on deep learning based malware detection techniques. Comput. Sci. Rev. 47, 100529 (2023). https://doi.org/10.1016/j.cosrev.2022.100529

    Article  Google Scholar 

  4. Al-Garadi, M.A., Mohamed, A., Al-Ali, A.K., Du, X., Ali, I., Guizani, M.: A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun. Surv. Tutor. 22(3), 1646–1685 (2020). https://doi.org/10.1109/COMST.2020.2988293

    Article  Google Scholar 

  5. Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures—profiling attacks without pre-processing. In: Fischer, W., Homma, N. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2017—19th International Conference, Taipei, Taiwan, September 25–28, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10529, pp. 45–68. Springer, New York (2017). https://doi.org/10.1007/978-3-319-66787-4_3

  6. Egger, M., Schamberger, T., Tebelmann, L., Lippert, F., Sigl, G.: A second look at the ASCAD databases. In: Balasch, J., O’Flynn, C. (eds.) Constructive Side-Channel Analysis and Secure Design—13th International Workshop, COSADE 2022, Leuven, Belgium, April 11–12, 2022, Proceedings. Lecture Notes in Computer Science, vol. 13211, pp. 75–99. Springer, New York (2022). https://doi.org/10.1007/978-3-030-99766-3_4

  7. Weissbart, L., Picek, S., Batina, L.: One trace is all it takes: Machine learning-based side-channel attack on eddsa. In: Bhasin, S., Mendelson, A., Nandi, M. (eds.) Security, Privacy, and Applied Cryptography Engineering—9th International Conference, SPACE 2019, Gandhinagar, India, December 3-7, 2019, Proceedings. Lecture Notes in Computer Science, vol. 11947, pp. 86–105. Springer, New York (2019). https://doi.org/10.1007/978-3-030-35869-3_8

  8. Hettwer, B., Gehrer, S., Güneysu, T.: Profiled power analysis attacks using convolutional neural networks with domain knowledge. In: Cid, C., Jr., M.J.J. (eds.) Selected Areas in Cryptography—SAC 2018—25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers. Lecture Notes in Computer Science, vol. 11349, pp. 479–498. Springer, New York (2018). https://doi.org/10.1007/978-3-030-10970-7_22

  9. Hoang, A., Hanley, N., O’Neill, M.: Plaintext: a missing feature for enhancing the power of deep learning in side-channel analysis? Breaking multiple layers of side-channel countermeasures. Cryptogr. Hardw. Embed. Syst. 2020(4), 49–85 (2020). https://doi.org/10.13154/tches.v2020.i4.49-85

    Article  Google Scholar 

  10. Perin, G., Chmielewski, L., Picek, S.: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337–364 (2020). https://doi.org/10.13154/tches.v2020.i4.337-364

    Article  Google Scholar 

  11. Bout, E., Loscrí, V., Gallais, A.: How machine learning changes the nature of cyberattacks on IoT networks: a survey. IEEE Commun. Surv. Tutor. 24(1), 248–279 (2022). https://doi.org/10.1109/COMST.2021.3127267

    Article  Google Scholar 

  12. Panoff, M., Yu, H., Shan, H., Jin, Y.: A review and comparison of ai-enhanced side channel analysis. ACM J. Emerg. Technol. Comput. Syst. 18(3), 62–16220 (2022). https://doi.org/10.1145/3517810

    Article  Google Scholar 

  13. Kubota, T., Yoshida, K., Shiozaki, M., Fujino, T.: Deep learning side-channel attack against hardware implementations of AES. Microprocess. Microsyst. 87, 103383 (2021). https://doi.org/10.1016/j.micpro.2020.103383

    Article  Google Scholar 

  14. Bronchain, O., Cassiers, G., Standaert, F.: Give me 5 minutes: Attacking ASCAD with a single side-channel trace. IACR Cryptol. ePrint Arch., 817 (2021)

  15. Tahsien, S.M., Karimipour, H., Spachos, P.: Machine learning based solutions for security of internet of things (IoT): a survey. J. Netw. Comput. Appl. 161, 102630 (2020). https://doi.org/10.1016/j.jnca.2020.102630

    Article  Google Scholar 

  16. Masure, L., Dumas, C., Prouff, E.: A comprehensive study of deep learning for side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1), 348–375 (2020). https://doi.org/10.13154/tches.v2020.i1.348-375

    Article  Google Scholar 

  17. Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10(2), 163–188 (2020). https://doi.org/10.1007/s13389-019-00220-8

    Article  Google Scholar 

  18. Sayadi, H., Aliasgari, M., Aydin, F., Potluri, S., Aysu, A., Edmonds, J., Tehranipoor, S.: Towards AI-enabled hardware security: challenges and opportunities. In: Savino, A., Rech, P., Carlo, S.D., Gizopoulos, D. (eds.) 28th IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2022, Torino, Italy, September 12–14, 2022, pp. 1–10. IEEE (2022). https://doi.org/10.1109/IOLTS56730.2022.9897507

  19. Moos, T., Wegener, F., Moradi, A.: DL-LA: deep learning leakage assessment A modern roadmap for SCA evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 552–598 (2021)

    Article  Google Scholar 

  20. Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 107–131 (2019). https://doi.org/10.13154/tches.v2019.i2.107-131

    Article  Google Scholar 

  21. Lin, T., Maji, S.: Improved bilinear pooling with cnns. In: British Machine Vision Conference 2017, BMVC 2017, London, UK, September 4–7, 2017. BMVA Press (2017). https://www.dropbox.com/s/fc6qtzvno7ln684/0395.pdf

  22. Lin, T., RoyChowdhury, A., Maji, S.: Bilinear CNN models for fine-grained visual recognition. In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015, pp. 1449–1457. IEEE Computer Society (2015). https://doi.org/10.1109/ICCV.2015.170

  23. Jin, C., Zhou, Y.: Enhancing deep-learning based side-channel analysis through simultaneously multi-byte training. Comput. J. 66(11), 2674–2704 (2023). https://doi.org/10.1093/COMJNL/BXAC112

    Article  Google Scholar 

  24. Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1), 1–36 (2020). https://doi.org/10.13154/tches.v2020.i1.1-36

    Article  Google Scholar 

  25. An, S., Liu, J., Duan, X., Zheng, M., Hu, H.: Strengthening profiled side channel attacks on AES via multi-view information aggregation. In: 17th International Conference on Computational Intelligence and Security CIS 2021, Chengdu, China, November 19–22, 2021, pp. 435–439. IEEE (2021). https://doi.org/10.1109/CIS54983.2021.00096

  26. Coron, J., Kizhvatov, I.: An efficient method for random delay generation in embedded software. In: Clavier, C., Gaj, K. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6–9, 2009, Proceedings. Lecture Notes in Computer Science, vol. 5747, pp. 156–170. Springer (2009). https://doi.org/10.1007/978-3-642-04138-9_12

  27. Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.: The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 209–237 (2019). https://doi.org/10.13154/tches.v2019.i1.209-237

    Article  Google Scholar 

Download references

Funding

This research is supported by the Hunan Provincial Natural Science Foundation of China (2022JJ30103), ‘the 14th Five-Year Plan’ Key Disciplines and Application-oriented Special Disciplines of Hunan Province (Xiangjiaotong [2022] 351), the Science and Technology Innovation Program of Hunan Province (2016TP1020).

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Yezhou Zhang. The first draft of the manuscript was written by Yezhou Zhang and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Lang Li.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

The used state-of-the-art models are listed in Table 3. The convolution layer is denoted by Conv; averaging pooling layer is denoted by Pool. BF denotes the fusion layer. FLAT and FC denote the flatten layer and fully connected, respectively. Finally, LSM denotes the output layer with the logsoftmax activation function.

Table 3 CNN\(\_\)BD architecture used for the attack

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y., Li, L. & Ou, Y. BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis. Cluster Comput 28, 2 (2025). https://doi.org/10.1007/s10586-024-04701-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04701-2

Keywords

Navigation