Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks

Donggeun Kwon, Seokhie Hong, Heeseok Kim

Research output: Contribution to journalArticlepeer-review

Abstract

The differential deep learning analysis proposed by Timon is the first non-profiled side-channel attack technique that uses deep learning. The technique recovers the secret key using the phenomenon of deep learning metrics. However, the proposed technique made it difficult to observe the results from the intermediate process, while the neural network had to be retrained repeatedly, as the cost of learning increased with key size. In this paper, we propose three methods to solve the aforementioned problems and any challenges resulting from solving these problems. First, we propose a modified algorithm that allows the monitoring of the metrics in the intermediate process. Second, we propose a parallel neural network architecture and algorithm that works by training a single network, with no need to re-train the same model repeatedly. Attacks were performed faster with the proposed algorithm than with the previous algorithm. Finally, we propose a novel architecture that uses shared layers to solve memory problems in parallel architecture and also helps achieve better performance. We validated the performance of our methods by presenting the results of non-profiled attacks on the benchmark database ASCAD and for a custom dataset on power consumption collected from ChipWhisperer-Lite. On the ASCAD database, our shared layers method was up to 134 times more efficient than the previous method.

Original languageEnglish
Pages (from-to)5957-5967
Number of pages11
JournalIEEE Access
Volume10
DOIs
Publication statusPublished - 2022

Keywords

  • Side-channel attacks
  • deep learning
  • differential deep learning analysis
  • efficient implementations
  • non-profiled attack

ASJC Scopus subject areas

  • Computer Science(all)
  • Materials Science(all)
  • Engineering(all)
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks'. Together they form a unique fingerprint.

Cite this