Cryptology ePrint Archive: Report 2018/1123

When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis

Stjepan Picek and Annelie Heuser and Lichao Wu and Cesare Alippi and Francesco Regazzoni

Abstract: Profiling side-channel attacks are considered the most potent form of side-channel attacks. They consist of two steps. First, the adversary builds a leakage model using a device similar to the target one. This leakage model is then exploited to extract the secret information from the victim's device. These attacks can be seen as a classification problem, where the adversary needs to decide to what class (and consequently, the secret key) the traces collected from the victim's device belong. The research community investigated profiling attacks in-depth, primarily by using an empirical approach. As such, it emerges that a theoretical framework to analyze profiling side-channel attacks comprehensively is still missing.

In this paper, we propose a theory-grounded framework capable of modeling and evaluating profiling side-channel analysis. The framework is based on the expectation estimation problem that has strong theoretical foundations. We quantify the effects of perturbations injected at different points in our framework through the robustness analysis, where the perturbations represent sources of uncertainty associated with measurements, non-optimal classifiers, and countermeasures. Finally, we use our framework to evaluate the performance of different classifiers using publicly available traces.

Category / Keywords: implementation / Machine Learning, Robustness Analysis, Supervised Learning, Framework

Date: received 19 Nov 2018, last revised 9 Jun 2021

Contact author: picek stjepan at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20210609:103935 (All versions of this report)

Short URL: ia.cr/2018/1123


[ Cryptology ePrint archive ]