You are looking at a specific version 20190220:182849 of this paper. See the latest version.

Paper 2019/168

Profiling Side-channel Analysis in the Restricted Attacker Framework

Stjepan Picek and Annelie Heuser and Sylvain Guilley

Abstract

Profiling side-channel attacks represent the most powerful category of side-channel attacks. There, we assume that the attacker has access to a clone device in order to profile the device. Additionally, we assume the attacker to be unbounded in power in an effort to give the worst-case security analysis. In this paper, we start from a different premise and consider an attacker in a restricted setting where he is able to profile only a limited number of measurements. To that end, we propose a new framework for profiling side-channel analysis that we call the Restricted Attacker framework. With it, we enforce the attackers to really conduct the most powerful attack possible but also we provide a setting that inherently allows a more fair analysis among attacks. Next, we discuss the ramifications of having the attacker with unbounded power when considering neural network-based attacks. There, we are able to prove that the Universal Approximation Theorem can result in neural network-based attacks being able to break implementations with only a single measurement. Those considerations further strengthen the need for the Restricted Attacker framework.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint.
Keywords
Side-channel analysisMachine learningDeep learningRestricted Attacker framework
Contact author(s)
picek stjepan @ gmail com
annelie heuser @ irisa fr
History
2020-05-30: revised
2019-02-20: received
See all versions
Short URL
https://ia.cr/2019/168
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.