Abstract
Deep learning algorithms are increasingly employed to exploit side-channel information, such as power consumption and electromagnetic leakage from hardware devices, significantly enhancing attack capabilities. However, relying solely on power traces for side-channel information often requires adequate domain knowledge. To address this limitation, this work proposes a new attack scheme. Firstly, a Convolutional Neural Network (CNN)-based plaintext-extended bilinear feature fusion model is designed. Secondly, multi-model intermediate layers are fused and trained, yielding in the increase of the amount of effective information and generalization ability. Finally, the model is employed to predict the output probability of three public side-channel datasets (e.g. ASCAD, AES\(\_\)HD, and AES\(\_\)RD), and analyze the recovery key guessing entropy for each key to efficiently assess attack efficiency. Experimental results showcase that the plaintext-extended bilinear feature fusion model can effectively enhance the Side-Channel Attack (SCA) capabilities and prediction performance. Deploying the proposed method, the number of traces required for a successful attack on the ASCAD\(\_\)R dataset is significantly reduced to less than 914, representing an 70.5% reduction in traces compared to the network in Convolutional Neural Network-Visual Geometry Group (CNNVGG16) with plaintext, which incorporating plaintext features before the fully connected layer. Compared to existing solutions, the proposed scheme requires only 80% of the power traces for the attack mask design using only 75 epochs. As a result, the power of the proposed method is well proved through the different experiments and comparison processes.
Similar content being viewed by others
Data availability
No datasets were generated or analysed during the current study.
References
Hettwer, B., Gehrer, S., Güneysu, T.: Applications of machine learning techniques in side-channel attacks: a survey. J. Cryptogr. Eng. 10(2), 135–162 (2020). https://doi.org/10.1007/s13389-019-00212-8
Ni, L., Wang, P., Zhang, Y., Zhang, H., Li, X., Ni, L., Lv, J., Zheng, W.: Profiling side-channel attacks based on CNN model fusion. Microelectron. J. 139, 105901 (2023). https://doi.org/10.1016/j.mejo.2023.105901
Gopinath, M., Sethuraman, S.C.: A comprehensive survey on deep learning based malware detection techniques. Comput. Sci. Rev. 47, 100529 (2023). https://doi.org/10.1016/j.cosrev.2022.100529
Al-Garadi, M.A., Mohamed, A., Al-Ali, A.K., Du, X., Ali, I., Guizani, M.: A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun. Surv. Tutor. 22(3), 1646–1685 (2020). https://doi.org/10.1109/COMST.2020.2988293
Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures—profiling attacks without pre-processing. In: Fischer, W., Homma, N. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2017—19th International Conference, Taipei, Taiwan, September 25–28, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10529, pp. 45–68. Springer, New York (2017). https://doi.org/10.1007/978-3-319-66787-4_3
Egger, M., Schamberger, T., Tebelmann, L., Lippert, F., Sigl, G.: A second look at the ASCAD databases. In: Balasch, J., O’Flynn, C. (eds.) Constructive Side-Channel Analysis and Secure Design—13th International Workshop, COSADE 2022, Leuven, Belgium, April 11–12, 2022, Proceedings. Lecture Notes in Computer Science, vol. 13211, pp. 75–99. Springer, New York (2022). https://doi.org/10.1007/978-3-030-99766-3_4
Weissbart, L., Picek, S., Batina, L.: One trace is all it takes: Machine learning-based side-channel attack on eddsa. In: Bhasin, S., Mendelson, A., Nandi, M. (eds.) Security, Privacy, and Applied Cryptography Engineering—9th International Conference, SPACE 2019, Gandhinagar, India, December 3-7, 2019, Proceedings. Lecture Notes in Computer Science, vol. 11947, pp. 86–105. Springer, New York (2019). https://doi.org/10.1007/978-3-030-35869-3_8
Hettwer, B., Gehrer, S., Güneysu, T.: Profiled power analysis attacks using convolutional neural networks with domain knowledge. In: Cid, C., Jr., M.J.J. (eds.) Selected Areas in Cryptography—SAC 2018—25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers. Lecture Notes in Computer Science, vol. 11349, pp. 479–498. Springer, New York (2018). https://doi.org/10.1007/978-3-030-10970-7_22
Hoang, A., Hanley, N., O’Neill, M.: Plaintext: a missing feature for enhancing the power of deep learning in side-channel analysis? Breaking multiple layers of side-channel countermeasures. Cryptogr. Hardw. Embed. Syst. 2020(4), 49–85 (2020). https://doi.org/10.13154/tches.v2020.i4.49-85
Perin, G., Chmielewski, L., Picek, S.: Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 337–364 (2020). https://doi.org/10.13154/tches.v2020.i4.337-364
Bout, E., Loscrí, V., Gallais, A.: How machine learning changes the nature of cyberattacks on IoT networks: a survey. IEEE Commun. Surv. Tutor. 24(1), 248–279 (2022). https://doi.org/10.1109/COMST.2021.3127267
Panoff, M., Yu, H., Shan, H., Jin, Y.: A review and comparison of ai-enhanced side channel analysis. ACM J. Emerg. Technol. Comput. Syst. 18(3), 62–16220 (2022). https://doi.org/10.1145/3517810
Kubota, T., Yoshida, K., Shiozaki, M., Fujino, T.: Deep learning side-channel attack against hardware implementations of AES. Microprocess. Microsyst. 87, 103383 (2021). https://doi.org/10.1016/j.micpro.2020.103383
Bronchain, O., Cassiers, G., Standaert, F.: Give me 5 minutes: Attacking ASCAD with a single side-channel trace. IACR Cryptol. ePrint Arch., 817 (2021)
Tahsien, S.M., Karimipour, H., Spachos, P.: Machine learning based solutions for security of internet of things (IoT): a survey. J. Netw. Comput. Appl. 161, 102630 (2020). https://doi.org/10.1016/j.jnca.2020.102630
Masure, L., Dumas, C., Prouff, E.: A comprehensive study of deep learning for side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1), 348–375 (2020). https://doi.org/10.13154/tches.v2020.i1.348-375
Benadjila, R., Prouff, E., Strullu, R., Cagli, E., Dumas, C.: Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10(2), 163–188 (2020). https://doi.org/10.1007/s13389-019-00220-8
Sayadi, H., Aliasgari, M., Aydin, F., Potluri, S., Aysu, A., Edmonds, J., Tehranipoor, S.: Towards AI-enabled hardware security: challenges and opportunities. In: Savino, A., Rech, P., Carlo, S.D., Gizopoulos, D. (eds.) 28th IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2022, Torino, Italy, September 12–14, 2022, pp. 1–10. IEEE (2022). https://doi.org/10.1109/IOLTS56730.2022.9897507
Moos, T., Wegener, F., Moradi, A.: DL-LA: deep learning leakage assessment A modern roadmap for SCA evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 552–598 (2021)
Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2), 107–131 (2019). https://doi.org/10.13154/tches.v2019.i2.107-131
Lin, T., Maji, S.: Improved bilinear pooling with cnns. In: British Machine Vision Conference 2017, BMVC 2017, London, UK, September 4–7, 2017. BMVA Press (2017). https://www.dropbox.com/s/fc6qtzvno7ln684/0395.pdf
Lin, T., RoyChowdhury, A., Maji, S.: Bilinear CNN models for fine-grained visual recognition. In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015, pp. 1449–1457. IEEE Computer Society (2015). https://doi.org/10.1109/ICCV.2015.170
Jin, C., Zhou, Y.: Enhancing deep-learning based side-channel analysis through simultaneously multi-byte training. Comput. J. 66(11), 2674–2704 (2023). https://doi.org/10.1093/COMJNL/BXAC112
Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient CNN architectures in profiling attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1), 1–36 (2020). https://doi.org/10.13154/tches.v2020.i1.1-36
An, S., Liu, J., Duan, X., Zheng, M., Hu, H.: Strengthening profiled side channel attacks on AES via multi-view information aggregation. In: 17th International Conference on Computational Intelligence and Security CIS 2021, Chengdu, China, November 19–22, 2021, pp. 435–439. IEEE (2021). https://doi.org/10.1109/CIS54983.2021.00096
Coron, J., Kizhvatov, I.: An efficient method for random delay generation in embedded software. In: Clavier, C., Gaj, K. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6–9, 2009, Proceedings. Lecture Notes in Computer Science, vol. 5747, pp. 156–170. Springer (2009). https://doi.org/10.1007/978-3-642-04138-9_12
Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.: The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1), 209–237 (2019). https://doi.org/10.13154/tches.v2019.i1.209-237
Funding
This research is supported by the Hunan Provincial Natural Science Foundation of China (2022JJ30103), ‘the 14th Five-Year Plan’ Key Disciplines and Application-oriented Special Disciplines of Hunan Province (Xiangjiaotong [2022] 351), the Science and Technology Innovation Program of Hunan Province (2016TP1020).
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Yezhou Zhang. The first draft of the manuscript was written by Yezhou Zhang and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
The used state-of-the-art models are listed in Table 3. The convolution layer is denoted by Conv; averaging pooling layer is denoted by Pool. BF denotes the fusion layer. FLAT and FC denote the flatten layer and fully connected, respectively. Finally, LSM denotes the output layer with the logsoftmax activation function.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhang, Y., Li, L. & Ou, Y. BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis. Cluster Comput 28, 2 (2025). https://doi.org/10.1007/s10586-024-04701-2
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10586-024-04701-2