计算机科学
仿形(计算机编程)
利用
旁道攻击
机器学习
人工智能
人工神经网络
汉明距离
深度学习
计算机安全
密码学
算法
操作系统
作者
Zelun Luo,Mengce Zheng,Ping Wang,Minhui Jin,Jiajia Zhang,Honggang Hu
标识
DOI:10.1109/trustcom53373.2021.00114
摘要
In recent years, various deep learning techniques have been exploited in side channel attacks, with the anticipation of obtaining more satisfactory attack results. Most of them con-centrate on improving network architectures or putting forward novel metrics, assuming that there are adequate profiling traces available to train an appropriate neural network. However, in practical scenarios, profiling traces are probably insufficient, which makes the network learn deficiently and compromises attack performance. In this paper, we investigate a kind of data augmentation technique, called mixup, and first propose to exploit it in deep-learning based side channel attacks, for the purpose of expanding the profiling set and facilitating the chances of mounting a successful attack. We utilize mixup to generate new traces and perform Correlation Power Analysis for generated traces and original traces. The analysis reveals that the leakage location and leakage intensity between them are consistent. In view of this observation, we consider it feasible to add generated traces to the original profiling set. Our verifying experiments show that mixup is truly capable of enhancing attack performance especially for insufficient profiling traces. Specifically, when the size of the training set is decreased to 30% of the whole set, mixup can almost reduce required attacking traces to half. We test three mixup parameter values and conclude that generally all of them can bring about improvements. Besides, we compare three leakage models and surprisingly discover that least significant bit model, which is less frequently used in previous works, actually surpasses prevalent identity model and hamming weight model in terms of attack results.
科研通智能强力驱动
Strongly Powered by AbleSci AI