Cryptology ePrint Archive: Report 2017/1085

Profiled SCA with a New Twist: Semi-supervised Learning

Stjepan Picek and Annelie Heuser and Alan Jovic and Axel Legay and Karlo Knezevic

Abstract: Profiled side-channel attacks represent the most powerful category of side-channel attacks. In this context, the attacker gains ac- cess of a profiling device to build a precise model which is used to attack another device in the attacking phase. Mostly, it is assumed that the attacker has unlimited capabilities in the profiling phase, whereas the attacking phase is very restricted. We step away from this assumption and consider an attacker who is restricted in the profiling phase, while the attacking phase is less limited as in the traditional view. Clearly, in general, the attacker is not hindered to exchange any available knowledge between the profiling and attacking phase. Accordingly, we propose the concept of semi-supervised learning to side-channel analysis, in which the attacker uses the small amount of labeled measurements from the profil- ing phase as well as the unlabeled measurements from the attacking phase to build a more reliable model. Our results show that semi-supervised learning is beneficial in many scenarios and of particular interest when using template attack and its pooled version as side-channel attack tech- niques. Besides stating our results in varying scenarios, we discuss more general conclusions on semi-supervised learning for SCA that should help to transfer our observations to other settings in SCA.

Category / Keywords: implementation / Side-channel attacks, Profiled scenario, Machine learning, Semi-profiled attack, Semi-supervised learning

Date: received 8 Nov 2017

Contact author: annelie heuser at irisa fr

Available format(s): PDF | BibTeX Citation

Version: 20171110:160023 (All versions of this report)

Short URL: ia.cr/2017/1085

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]