首页> 外文会议>International Conference on Selected Areas in Cryptography >Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
【24h】

Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery

机译:泄漏分析和对称键恢复的深度神经网络归因方法

获取原文

摘要

Deep Neural Networks (DNNs) have recently received significant attention in the side-channel community due to their state-of-the-art performance in security testing of embedded systems. However, research on the subject mostly focused on techniques to improve the attack efficiency in terms of the number of traces required to extract secret parameters. What has not been investigated in detail is a constructive approach of DNNs as a tool to evaluate and improve the effectiveness of countermeasures against side-channel attacks. In this work, we close this gap by applying attribution methods that aim for interpreting Deep Neural Network (DNN) decisions in order to identify leaking operations in cryptographic implementations. In particular, we investigate three different approaches that have been proposed for feature visualization in image classification tasks and compare them regarding their suitability to reveal Points of Interest (POIs) in side-channel traces. We show by experiments with four separate data sets that the three methods are especially interesting in the context of side-channel protected implementations and misaligned measurements. Finally, we demonstrate that attribution can also serve as a powerful side-channel distinguisher leading to a successful retrieval of the secret key with at least five times fewer traces compared to standard key recovery in DNN-based attack setups.
机译:由于它们在嵌入式系统的安全测试中,深度神经网络(DNN)最近在侧通道社区中获得了重大关注。然而,对该主题的研究大多专注于提高提取秘密参数所需的迹线数量的攻击效率的技术。未详细研究的是DNN的建设性方法,作为评估和提高对策对侧通道攻击的有效性的工具。在这项工作中,我们通过应用旨在解释深度神经网络(DNN)决策的归属方法来关闭这种差距,以便识别加密实现中的泄漏操作。特别是,我们研究了三种不同的方法,这些方法已经在图像分类任务中提出了一种特征可视化,并比较它们关于它们在侧通道迹线中揭示兴趣点(POI)的适用性。我们通过四个单独的数据集显示三种方法,即三种方法在侧通道受保护的实现和未对准测量的上下文中特别有趣。最后,我们证明归因也可以作为强大的侧通道区分器,导致秘密密钥的成功检索,与基于DNN的攻击设置中的标准密钥恢复相比,迹线较少的痕迹更少。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号