2017
DOI: 10.1007/s13389-017-0162-9
|View full text |Cite
|
Sign up to set email alerts
|

Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version

Abstract: Template attacks and machine learning are two popular approaches to profiled side-channel analysis. In this paper, we aim to contribute to the understanding of their respective strengths and weaknesses, with a particular focus on their curse of dimensionality. For this purpose, we take advantage of a well-controlled simulated experimental setting in order to put forward two important aspects. First and from a theoretic point of view, the data complexity of template attacks is not sensitive to the dimension inc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(27 citation statements)
references
References 32 publications
0
22
0
Order By: Relevance
“…In 2002, the first profiled attack was introduced by [CRR03], but their proposal was limited by the computational complexity. Very similar to profiled attacks, the application of machine learning algorithms was inevitably explored in the side-channel context [HGM + 11, BL12, HZ12, LBM14,LPMS18].…”
Section: Introductionmentioning
confidence: 99%
“…In 2002, the first profiled attack was introduced by [CRR03], but their proposal was limited by the computational complexity. Very similar to profiled attacks, the application of machine learning algorithms was inevitably explored in the side-channel context [HGM + 11, BL12, HZ12, LBM14,LPMS18].…”
Section: Introductionmentioning
confidence: 99%
“…Measurements are also noisy (due to interference and fading effects) and highly dimensional (in terms of samples per trace), which complicates the issue further. Although classic TAs consider multiple time units as well [CRR02], they are not suited for high-dimensional data [CDP17,LPMS17].…”
Section: Correlation Optimizationmentioning
confidence: 99%
“…In traditional non-profiled attacks, such as differential and correlation power analysis (DPA [1]/CPA [9]) attacks, the attacker gathers power traces from a target device and uses statistical techniques, such as the difference of mean traces or Pearson Correlation Coefficient to break the secret key. On the other hand, profiling-based attacks [8], [10], [11] assume the worst-case scenario from the perspective of the target crypto engine, where the adversary is assumed to possess an identical device to profile the leakage patterns for all possible combinations for a keybyte (profiling or training phase), and use this prior knowledge to identify the secret key of the victim's crypto engine (online or test phase). Such an attack has been demonstrated on a commercially available contactless smart card in [12].…”
Section: Introduction a Motivationmentioning
confidence: 99%
“…The advantage of deep learning based attacks is that not only do they perform as good as the template-based attacks, they do not require extensive statistical analysis to identify POIs. Moreover, as the number of dimensions increase, machine learning based attacks start to gain interest, because increase in number of non-informative points in POIs degrades performance of template attacks [11]. But these ML-based approaches mentioned above rely on the assumption that the leakage profile from the profiling and the target devices are similar.…”
Section: Introduction a Motivationmentioning
confidence: 99%