Cryptology ePrint Archive: Report 2018/880

Spread: a new layer for profiled deep-learning side-channel attacks

Christophe Pfeifer and Patrick Haddad

Abstract: Recent publications, such as [10] and [13], exploit the advantages of deep-learning techniques in performing Side-Channel Attacks. One example of the Side-Channel community interest for such techniques is the release of the public ASCAD database, which provides power consumption traces of a masked 128-bit AES implementation, and is meant to be a common benchmark to compare deep-learning techniques performances. In this paper, we propose two ways of improving the effectiveness of such attacks. The first one is as new kind of layer for neural networks, called "Spread" layer, which is efficient at tackling side-channel attacks issues, since it reduces the number of layers required and speeds up the learning phase. Our second proposal is an efficient way to correct the neural network predictions, based on its confusion matrix. We have validated both methods on ASCAD database, and conclude that they reduce the number of traces required to succeed attacks. In this article, we show their effectiveness for first-order and second-order attacks.

Category / Keywords: implementation / Deep-learning,Side-channel attacks,Spread layer,ASCAD,Confusion matrix,Bayesian correction

Date: received 19 Sep 2018, last revised 12 Dec 2018

Contact author: patrick haddad at st com

Available format(s): PDF | BibTeX Citation

Note: Changes: Formula 5 Added information about how x is remapped to x' minor grammar changes

Version: 20181212:095716 (All versions of this report)

Short URL: ia.cr/2018/880


[ Cryptology ePrint archive ]