首页> 外文会议>International Symposium on Quality Electronic Design >Deep Learning assisted Cross-Family Profiled Side-Channel Attacks using Transfer Learning
【24h】

Deep Learning assisted Cross-Family Profiled Side-Channel Attacks using Transfer Learning

机译:深入学习辅助跨家庭分析使用转移学习的侧渠攻击

获取原文

摘要

Side-channel analysis (SCA) utilizing the power consumption of a device has proved to be an efficient technique for recovering secret keys exploiting the implementation vulnerability of mathematically secure cryptographic algorithms. Recently, Deep Learning-based profiled SCA (DL-SCA) has gained popularity, where an adversary trains a deep learning model using profiled traces obtained from a dummy device (a device that is similar to the target device) and uses the trained model to retrieve the secret key from the target device. However, for efficient key recovery from the target device, training of such a model requires a large number of profiled traces from the dummy device and extensive training time. In this paper, we propose TranSCA, a new DL-SCA strategy that tries to address the issue. TranSCA works in three steps – an adversary (1) performs a one-time training of a base model using profiled traces from any device, (2) fine-tunes the parameters of the base model using significantly less profiled traces from a dummy device with the aid of transfer learning strategy in lesser time than training from scratch, and (3) uses the fine-tuned model to attack the target device. We validate TranSCA on simulated power traces created to represent different FPGA families. Experimental results show that the transfer learning strategy makes it possible to attack a new device from the knowledge of another device even if the new device belongs to a different family. Also, TranSCA requires very few power traces from the dummy device compared to when applying DL-SCA without any previous knowledge.
机译:利用设备的功耗的侧通道分析(SCA)已被证明是用于恢复秘密密钥的有效技术,用于利用数学安全加密算法的实现漏洞。最近,基于深度学习的分布式SCA(DL-SCA)已经获得了普及,其中,对手使用从虚拟装置(类似于目标设备的设备)获得的分布式迹线进行深入学习模型,并将培训的模型用于从目标设备检索秘密密钥。然而,为了从目标设备的有效键恢复,这种模型的培训需要来自虚拟设备的大量分布迹线和广泛的培训时间。在本文中,我们提出了一种尝试解决问题的新型DL-SCA战略。 Transca在三个步骤中工作 - 对手(1)使用来自任何设备的分布迹线执行基础模型的一次性训练,(2)微调基础模型的参数使用来自虚拟设备的显着更少的分布迹线在较小的时间内转移学习策略的帮助,而不是从头训练,(3)使用微调模型来攻击目标设备。我们验证了创建不同FPGA系列的模拟电源迹线的Transca。实验结果表明,即使新设备属于不同的家庭,转移学习策略也可以从另一个设备的知识攻击新设备。此外,与在没有任何先前知识的情况下应用DL-SCA时,Transca要求与虚拟设备相比非常少的电力迹线。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号