eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2020/1258

TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks

Dhruv Thapar, Manaar Alam, and Debdeep Mukhopadhyay

Abstract

Side-channel analysis (SCA) utilizing the power consumption of a device has proved to be an efficient technique for recovering secret keys exploiting the implementation vulnerability of mathematically secure cryptographic algorithms. Recently, Deep Learning-based profiled SCA (DL-SCA) has gained popularity, where an adversary trains a deep learning model using profiled traces obtained from a dummy device (a device that is similar to the target device) and uses the trained model to retrieve the secret key from the target device. \emph{However, for efficient key recovery from the target device, training of such a model requires a large number of profiled traces from the dummy device and extensive training time}. In this paper, we propose \emph{TranSCA}, a new DL-SCA strategy that tries to address the issue. \emph{TranSCA} works in three steps -- an adversary (1) performs a one-time training of a \emph{base model} using profiled traces from \emph{any} device, (2) fine-tunes the parameters of the \emph{base model} using significantly less profiled traces from a dummy device with the aid of \emph{transfer learning} strategy in lesser time than training from scratch, and (3) uses the fine-tuned model to attack the target device. We validate \emph{TranSCA} on simulated power traces created to represent different FPGA families. Experimental results show that the transfer learning strategy makes it possible to attack a new device from the knowledge of another device even if the new device belongs to a different family. Also, \emph{TranSCA} requires very few power traces from the dummy device compared to when applying DL-SCA without any previous knowledge.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
Deep Neural NetworkSide-Channel AttacksTransfer Learning
Contact author(s)
alam manaar @ gmail com
History
2020-10-14: received
Short URL
https://ia.cr/2020/1258
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/1258,
      author = {Dhruv Thapar and Manaar Alam and Debdeep Mukhopadhyay},
      title = {TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks},
      howpublished = {Cryptology ePrint Archive, Paper 2020/1258},
      year = {2020},
      note = {\url{https://eprint.iacr.org/2020/1258}},
      url = {https://eprint.iacr.org/2020/1258}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.