You are looking at a specific version 20210302:204253 of this paper. See the latest version.

Paper 2021/242

GAP: Born to Break Hiding

Ju-Hwan Kim and Ji-Eun Woo and Soo-Jin Kim and So-Yeon Park and Dong-Guk Han

Abstract

Recently, Machine Learning (ML) is widely investigated in the side-channel analysis (SCA) community. As an artificial neural network can extract the feature without preprocessing, ML-based SCA methods relatively less rely on the attacker's ability. Consequently, they outperform traditional methods. Hiding is a countermeasure against SCA that randomizes the moments of manipulating sensitive data. Since hiding could disturb the neural network's learning, an attacker should design a proper architecture against hiding. In this paper, we propose inherently robust architecture against every kind of desynchronization. We demonstrated the proposed method with plenty of datasets, including open datasets. As a result, our method outperforms state-of-the-art on every dataset.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Side-Channel AnalysisDeep LearningGlobal Average PoolingDesynchronizationHiding
Contact author(s)
zzzz2605 @ kookmin ac kr
History
2021-03-02: received
Short URL
https://ia.cr/2021/242
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.