Side-channel attacks aim to recover cryptographic secrets by exploiting involuntary information channels coming from the computational platform of the targeted cipher implementation, e.g., power consumption or electromagnetic emissions. Among them deep learning based attacks have recently obtained great attention from both industry and academia, due to their greater efficiency and accuracy with respect to other methodologies. We provide a systematic comparison of the effectiveness of deep learning based attacks by considering different data acquisition and training methods. We also tackle the problem of the portability of the derived information leakage model, by analysing multiple instances of the same device, an ARM Cortex-M4 32-bit processor, running a software implementation of the AES-128 cipher. We complement the exploration of the attack space considering datasets corresponding to cipher executions employing, for each run, either the same fixed secret key or a randomly chosen one. Furthermore, we generalize the set of inputs considered to build the model by adding also the plaintexts fed to each cipher run. Finally, from the perspective of efficiency, we point out several not expected and not intuitive benchmark points.

A comparison of deep learning approaches for power-based side-channel attacks

R. Capoferri;A. Barenghi;L. Breveglieri;N. Izzo;G. Pelosi
2025-01-01

Abstract

Side-channel attacks aim to recover cryptographic secrets by exploiting involuntary information channels coming from the computational platform of the targeted cipher implementation, e.g., power consumption or electromagnetic emissions. Among them deep learning based attacks have recently obtained great attention from both industry and academia, due to their greater efficiency and accuracy with respect to other methodologies. We provide a systematic comparison of the effectiveness of deep learning based attacks by considering different data acquisition and training methods. We also tackle the problem of the portability of the derived information leakage model, by analysing multiple instances of the same device, an ARM Cortex-M4 32-bit processor, running a software implementation of the AES-128 cipher. We complement the exploration of the attack space considering datasets corresponding to cipher executions employing, for each run, either the same fixed secret key or a randomly chosen one. Furthermore, we generalize the set of inputs considered to build the model by adding also the plaintexts fed to each cipher run. Finally, from the perspective of efficiency, we point out several not expected and not intuitive benchmark points.
2025
Secure IT Systems
978-3-031-79006-5
side-channel analysis, deep learning, applied cryptography
File in questo prodotto:
File Dimensione Formato  
A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks.pdf

accesso aperto

: Post-Print (DRAFT o Author’s Accepted Manuscript-AAM)
Dimensione 4.63 MB
Formato Adobe PDF
4.63 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11311/1278098
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact