Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation

نویسندگان

چکیده

Deep learning (DL)-based techniques have recently proven to be very successful when applied profiled side-channel attacks (SCA). In a real-world SCA scenario, attackers gain knowledge about the target device by getting access similar prior attack. However, most state-of-the-art literature performs only proof-of-concept attacks, where traces intended for profiling and attacking are acquired consecutively on same fully-controlled device. This paper reminds that even small discrepancy between attack (regarded as domain discrepancy) can cause single-device completely fail. To address issue of discrepancy, we propose Cross-Device Profiled Attack (CDPA), which introduces an additional fine-tuning phase after establishing pretrained model. The is designed adjust pre-trained network, such it learn hidden representation not discriminative but also domain-invariant. order obtain domain-invariance, adopt maximum mean (MMD) loss constraint term classic cross-entropy function. We show MMD easily calculated embedded in standard convolutional neural network. evaluate our strategy both publicly available datasets multiple devices (eight Atmel XMEGA 8-bit microcontrollers three SAKURA-G evaluation boards). results demonstrate CDPA improve performance DL-based orders magnitude, significantly eliminates impact caused different devices.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Compare Profiled Side-Channel Attacks?

Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this scenario, an adversary first uses a device under his control in order to build a good leakage model. Then, he takes advantage of this leakage model to exploit the actual leakages of a similar target device and perform ...

متن کامل

An Unsupervised Learning Model to Perform Side Channel Attack

This paper proposes a novel unsupervised learning approach for Power Analysis – a form of side channel attack in Cryptanalysis. Different from existing works that exploit supervised learning framework to solve this problem, our method does not require any labeled pairs, which contains information of the form {X,Y}={key, power-trace}, but is still capable of deciphering the secret key accurately...

متن کامل

A Theory of Output-Side Unsupervised Domain Adaptation

When learning a mapping from an input space to an output space, the assumption that the sample distribution of the training data is the same as that of the test data is often violated. Unsupervised domain shift methods adapt the learned function in order to correct for this shift. Previous work has focused on utilizing unlabeled samples from the target distribution. We consider the complementar...

متن کامل

Profiled Model Based Power Simulator for Side Channel Evaluation

An embedded cryptographic device performs operation on sensitive data and as such, is vulnerable to side-channel attacks. This forces smart-card manufacturers to carefully consider development of security mechanisms. To accelerate this procedure, the use of power and electromagnetic simulator can be relevant and saves non negligible time. Based on a high level simulator, we propose to use profi...

متن کامل

Unsupervised Transductive Domain Adaptation

Supervised learning with large scale labeled datasets and deep layered models has made a paradigm shift in diverse areas in learning and recognition. However, this approach still suffers generalization issues under the presence of a domain shift between the training and the test data distribution. In this regard, unsupervised domain adaptation algorithms have been proposed to directly address t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2021

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2021.i4.27-56