Exploiting Support Vector Machine Algorithm to Break the Secret Key

Template attacks (TA) and support vector machine (SVM) are two effective methods in side channel attacks (SCAs). Almost all studies on SVM in SCAs assume the required power traces are sufficient, which also implies the number of profiling traces belonging to each class is equivalent. Indeed, in the...

Full description

Bibliographic Details
Main Authors: S. Hou, Y. Zhou, H. Liu, N. Zhu
Format: Article
Language:English
Published: Spolecnost pro radioelektronicke inzenyrstvi 2018-04-01
Series:Radioengineering
Subjects:
Online Access:https://www.radioeng.cz/fulltexts/2018/18_01_0289_0298.pdf
_version_ 1811270848610304000
author S. Hou
Y. Zhou
H. Liu
N. Zhu
author_facet S. Hou
Y. Zhou
H. Liu
N. Zhu
author_sort S. Hou
collection DOAJ
description Template attacks (TA) and support vector machine (SVM) are two effective methods in side channel attacks (SCAs). Almost all studies on SVM in SCAs assume the required power traces are sufficient, which also implies the number of profiling traces belonging to each class is equivalent. Indeed, in the real attack scenario, there may not be enough power traces due to various restrictions. More specifically, the Hamming Weight of the S-Box output results in 9 binomial distributed classes, which significantly reduces the performance of SVM compared with the uniformly distributed classes. In this paper, the impact of the distribution of profiling traces on the performance of SVM is first explored in detail. And also, we conduct Synthetic Minority Oversampling TEchnique (SMOTE) to solve the problem caused by the binomial distributed classes. By using SMOTE, the success rate of SVM is improved in the testing phase, and SVM requires fewer power traces to recover the key. Besides, TA is selected as a comparison. In contrast to what is perceived as common knowledge in unrestricted scenarios, our results indicate that SVM with proper parameters can significantly outperform TA.
first_indexed 2024-04-12T22:09:47Z
format Article
id doaj.art-47f2780db80b4ccf9659320ad28c0e65
institution Directory Open Access Journal
issn 1210-2512
language English
last_indexed 2024-04-12T22:09:47Z
publishDate 2018-04-01
publisher Spolecnost pro radioelektronicke inzenyrstvi
record_format Article
series Radioengineering
spelling doaj.art-47f2780db80b4ccf9659320ad28c0e652022-12-22T03:14:48ZengSpolecnost pro radioelektronicke inzenyrstviRadioengineering1210-25122018-04-01271289298Exploiting Support Vector Machine Algorithm to Break the Secret KeyS. HouY. ZhouH. LiuN. ZhuTemplate attacks (TA) and support vector machine (SVM) are two effective methods in side channel attacks (SCAs). Almost all studies on SVM in SCAs assume the required power traces are sufficient, which also implies the number of profiling traces belonging to each class is equivalent. Indeed, in the real attack scenario, there may not be enough power traces due to various restrictions. More specifically, the Hamming Weight of the S-Box output results in 9 binomial distributed classes, which significantly reduces the performance of SVM compared with the uniformly distributed classes. In this paper, the impact of the distribution of profiling traces on the performance of SVM is first explored in detail. And also, we conduct Synthetic Minority Oversampling TEchnique (SMOTE) to solve the problem caused by the binomial distributed classes. By using SMOTE, the success rate of SVM is improved in the testing phase, and SVM requires fewer power traces to recover the key. Besides, TA is selected as a comparison. In contrast to what is perceived as common knowledge in unrestricted scenarios, our results indicate that SVM with proper parameters can significantly outperform TA.https://www.radioeng.cz/fulltexts/2018/18_01_0289_0298.pdfPower analysissupport vector machinesynthetic minority oversampling techniqueHamming Weight class
spellingShingle S. Hou
Y. Zhou
H. Liu
N. Zhu
Exploiting Support Vector Machine Algorithm to Break the Secret Key
Radioengineering
Power analysis
support vector machine
synthetic minority oversampling technique
Hamming Weight class
title Exploiting Support Vector Machine Algorithm to Break the Secret Key
title_full Exploiting Support Vector Machine Algorithm to Break the Secret Key
title_fullStr Exploiting Support Vector Machine Algorithm to Break the Secret Key
title_full_unstemmed Exploiting Support Vector Machine Algorithm to Break the Secret Key
title_short Exploiting Support Vector Machine Algorithm to Break the Secret Key
title_sort exploiting support vector machine algorithm to break the secret key
topic Power analysis
support vector machine
synthetic minority oversampling technique
Hamming Weight class
url https://www.radioeng.cz/fulltexts/2018/18_01_0289_0298.pdf
work_keys_str_mv AT shou exploitingsupportvectormachinealgorithmtobreakthesecretkey
AT yzhou exploitingsupportvectormachinealgorithmtobreakthesecretkey
AT hliu exploitingsupportvectormachinealgorithmtobreakthesecretkey
AT nzhu exploitingsupportvectormachinealgorithmtobreakthesecretkey