On the performance of non‐profiled side channel attacks based on deep learning techniques

Abstract In modern embedded systems, security issues including side‐channel attacks (SCAs) are becoming of paramount importance since the embedded devices are ubiquitous in many categories of consumer electronics. Recently, deep learning (DL) has been introduced as a new promising approach for profi...

Full description

Bibliographic Details
Main Authors: Ngoc‐Tuan Do, Van‐Phuc Hoang, Van Sang Doan, Cong‐Kha Pham
Format: Article
Language:English
Published: Hindawi-IET 2023-05-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12102
_version_ 1797422338878210048
author Ngoc‐Tuan Do
Van‐Phuc Hoang
Van Sang Doan
Cong‐Kha Pham
author_facet Ngoc‐Tuan Do
Van‐Phuc Hoang
Van Sang Doan
Cong‐Kha Pham
author_sort Ngoc‐Tuan Do
collection DOAJ
description Abstract In modern embedded systems, security issues including side‐channel attacks (SCAs) are becoming of paramount importance since the embedded devices are ubiquitous in many categories of consumer electronics. Recently, deep learning (DL) has been introduced as a new promising approach for profiled and non‐profiled SCAs. This paper proposes and evaluates the applications of different DL techniques including the Convolutional Neural Network and the multilayer perceptron models for non‐profiled attacks on the AES‐128 encryption implementation. Especially, the proposed network is fine‐tuned with different number of hidden layers, labelling techniques and activation functions. Along with the designed models, a dataset reconstruction and labelling technique for the proposed model has also been performed for solving the high dimension data and imbalanced dataset problem. As a result, the DL based SCA with our reconstructed dataset for different targets of ASCAD, RISC‐V microcontroller, and ChipWhisperer boards has achieved a higher performance of non‐profiled attacks. Specifically, necessary investigations to evaluate the efficiency of the proposed techniques against different SCA countermeasures, such as masking and hiding, have been performed. In addition, the effect of the activation function on the proposed DL models was investigated. The experimental results have clarified that the exponential linear unit function is better than the rectified linear unit in fighting against noise generation‐based hiding countermeasure.
first_indexed 2024-03-09T07:30:52Z
format Article
id doaj.art-0198f9f51d0b4730b284287cfe551d2a
institution Directory Open Access Journal
issn 1751-8709
1751-8717
language English
last_indexed 2024-03-09T07:30:52Z
publishDate 2023-05-01
publisher Hindawi-IET
record_format Article
series IET Information Security
spelling doaj.art-0198f9f51d0b4730b284287cfe551d2a2023-12-03T06:14:31ZengHindawi-IETIET Information Security1751-87091751-87172023-05-0117337739310.1049/ise2.12102On the performance of non‐profiled side channel attacks based on deep learning techniquesNgoc‐Tuan Do0Van‐Phuc Hoang1Van Sang Doan2Cong‐Kha Pham3Institute of System Integration Le Quy Don Technical University Hanoi VietnamInstitute of System Integration Le Quy Don Technical University Hanoi VietnamVietnam Naval Academy Nha Trang VietnamThe University of Electro‐Communications (UEC) Tokyo JapanAbstract In modern embedded systems, security issues including side‐channel attacks (SCAs) are becoming of paramount importance since the embedded devices are ubiquitous in many categories of consumer electronics. Recently, deep learning (DL) has been introduced as a new promising approach for profiled and non‐profiled SCAs. This paper proposes and evaluates the applications of different DL techniques including the Convolutional Neural Network and the multilayer perceptron models for non‐profiled attacks on the AES‐128 encryption implementation. Especially, the proposed network is fine‐tuned with different number of hidden layers, labelling techniques and activation functions. Along with the designed models, a dataset reconstruction and labelling technique for the proposed model has also been performed for solving the high dimension data and imbalanced dataset problem. As a result, the DL based SCA with our reconstructed dataset for different targets of ASCAD, RISC‐V microcontroller, and ChipWhisperer boards has achieved a higher performance of non‐profiled attacks. Specifically, necessary investigations to evaluate the efficiency of the proposed techniques against different SCA countermeasures, such as masking and hiding, have been performed. In addition, the effect of the activation function on the proposed DL models was investigated. The experimental results have clarified that the exponential linear unit function is better than the rectified linear unit in fighting against noise generation‐based hiding countermeasure.https://doi.org/10.1049/ise2.12102computer network securitycryptographyembedded systemssecurity
spellingShingle Ngoc‐Tuan Do
Van‐Phuc Hoang
Van Sang Doan
Cong‐Kha Pham
On the performance of non‐profiled side channel attacks based on deep learning techniques
IET Information Security
computer network security
cryptography
embedded systems
security
title On the performance of non‐profiled side channel attacks based on deep learning techniques
title_full On the performance of non‐profiled side channel attacks based on deep learning techniques
title_fullStr On the performance of non‐profiled side channel attacks based on deep learning techniques
title_full_unstemmed On the performance of non‐profiled side channel attacks based on deep learning techniques
title_short On the performance of non‐profiled side channel attacks based on deep learning techniques
title_sort on the performance of non profiled side channel attacks based on deep learning techniques
topic computer network security
cryptography
embedded systems
security
url https://doi.org/10.1049/ise2.12102
work_keys_str_mv AT ngoctuando ontheperformanceofnonprofiledsidechannelattacksbasedondeeplearningtechniques
AT vanphuchoang ontheperformanceofnonprofiledsidechannelattacksbasedondeeplearningtechniques
AT vansangdoan ontheperformanceofnonprofiledsidechannelattacksbasedondeeplearningtechniques
AT congkhapham ontheperformanceofnonprofiledsidechannelattacksbasedondeeplearningtechniques