2019
DOI: 10.1109/tvlsi.2019.2926324
|View full text |Cite
|
Sign up to set email alerts
|

Practical Approaches Toward Deep-Learning-Based Cross-Device Power Side-Channel Attack

Abstract: Power side-channel analysis (SCA) has been of immense interest to most embedded designers to evaluate the physical security of the system. This work presents profiling-based cross-device power SCA attacks using deep learning techniques on 8-bit AVR microcontroller devices running AES-128. Firstly, we show the practical issues that arise in these profiling-based cross-device attacks due to significant device-to-device variations. Secondly, we show that utilizing Principal Component Analysis (PCA) based pre-proc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 51 publications
(18 citation statements)
references
References 50 publications
0
12
0
1
Order By: Relevance
“…where K target is the target key byte, Pr(Majority(N) = K target ) gives the probability of successful target key recovery utilizing majority voting with N traces and p is the single-trace X-DeepSCA attack accuracy. To further enhance the effectiveness of X-DeepSCA attacks, pre-processing techniques such as principal component analysis (PCA) for dimensionality reduction and dynamic time warping (DTW) have been explored [30]. The code for the X-DeepSCA attack is shared publicly in GitHub [31].…”
Section: Cross-device Deep-learning Attack: X-deepscamentioning
confidence: 99%
“…where K target is the target key byte, Pr(Majority(N) = K target ) gives the probability of successful target key recovery utilizing majority voting with N traces and p is the single-trace X-DeepSCA attack accuracy. To further enhance the effectiveness of X-DeepSCA attacks, pre-processing techniques such as principal component analysis (PCA) for dimensionality reduction and dynamic time warping (DTW) have been explored [30]. The code for the X-DeepSCA attack is shared publicly in GitHub [31].…”
Section: Cross-device Deep-learning Attack: X-deepscamentioning
confidence: 99%
“…To explore how board diversity affects the attack accuracy of the trained deep-learning models, Wang et al [7] show to extend which a model trained for one device can lead to successful attacks on another device. To mitigate the effect caused by the board diversity, References [8][9][10] propose a cross-device approach, which trains models on traces captured from multiple devices. Besides, in [11], the newly proposed federated learning framework [12] is applied to improve the attack efficiency to break an 8-bit ATx-mega128D4 microcontroller implementation of AES-128.…”
Section: Introductionmentioning
confidence: 99%
“…Current cryptography methods for addressing security issues center on the idea of having a digital key, which is safely stored and whose information remains unknown to an adversary. However, implementing this simple concept turns out to be a difficult task: software such as Trojan horses and malware, and side-channel attacks carried out by enemies with single access to the device, can expose the key and lead to security breaches [4,[9][10][11][12]. As Tim Cook (Apple CEO) emphasized in a recent interview [13]:…”
Section: Introductionmentioning
confidence: 99%