Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation
نویسندگان
چکیده
Deep learning (DL)-based techniques have recently proven to be very successful when applied profiled side-channel attacks (SCA). In a real-world SCA scenario, attackers gain knowledge about the target device by getting access similar prior attack. However, most state-of-the-art literature performs only proof-of-concept attacks, where traces intended for profiling and attacking are acquired consecutively on same fully-controlled device. This paper reminds that even small discrepancy between attack (regarded as domain discrepancy) can cause single-device completely fail. To address issue of discrepancy, we propose Cross-Device Profiled Attack (CDPA), which introduces an additional fine-tuning phase after establishing pretrained model. The is designed adjust pre-trained network, such it learn hidden representation not discriminative but also domain-invariant. order obtain domain-invariance, adopt maximum mean (MMD) loss constraint term classic cross-entropy function. We show MMD easily calculated embedded in standard convolutional neural network. evaluate our strategy both publicly available datasets multiple devices (eight Atmel XMEGA 8-bit microcontrollers three SAKURA-G evaluation boards). results demonstrate CDPA improve performance DL-based orders magnitude, significantly eliminates impact caused different devices.
منابع مشابه
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under his control in order to build a good leakage model. Then, he takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform ...
متن کاملAn Unsupervised Learning Model to Perform Side Channel Attack
This paper proposes a novel unsupervised learning approach for Power Analysis – a form of side channel attack in Cryptanalysis. Different from existing works that exploit supervised learning framework to solve this problem, our method does not require any labeled pairs, which contains information of the form {X,Y}={key, power-trace}, but is still capable of deciphering the secret key accurately...
متن کاملA Theory of Output-Side Unsupervised Domain Adaptation
When learning a mapping from an input space to an output space, the assumption that the sample distribution of the training data is the same as that of the test data is often violated. Unsupervised domain shift methods adapt the learned function in order to correct for this shift. Previous work has focused on utilizing unlabeled samples from the target distribution. We consider the complementar...
متن کاملProfiled Model Based Power Simulator for Side Channel Evaluation
An embedded cryptographic device performs operation on sensitive data and as such, is vulnerable to side-channel attacks. This forces smart-card manufacturers to carefully consider development of security mechanisms. To accelerate this procedure, the use of power and electromagnetic simulator can be relevant and saves non negligible time. Based on a high level simulator, we propose to use profi...
متن کاملUnsupervised Transductive Domain Adaptation
Supervised learning with large scale labeled datasets and deep layered models has made a paradigm shift in diverse areas in learning and recognition. However, this approach still suffers generalization issues under the presence of a domain shift between the training and the test data distribution. In this regard, unsupervised domain adaptation algorithms have been proposed to directly address t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems
سال: 2021
ISSN: ['2569-2925']
DOI: https://doi.org/10.46586/tches.v2021.i4.27-56