Cryptology ePrint Archive: Report 2022/340

To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA

Azade Rezaeezade and Guilherme Perin and Stjepan Picek

Abstract: Profiling side-channel analysis allows evaluators to estimate the worst-case security of a target. When security evaluations relax the assumptions about the adversary's knowledge, profiling models may easily be sub-optimal due to the inability to extract the most informative points of interest from the side-channel measurements. When used for profiling attacks, deep neural networks can learn strong models without feature selection with the drawback of expensive hyperparameter tuning. Unfortunately, due to very large search spaces, one usually finds very different model behaviors, and a widespread situation is to face overfitting with typically poor generalization capacity.

Usually, overfitting or poor generalization would be mitigated by adding more measurements to the profiling phase to reduce estimation errors. This paper provides a detailed analysis of different deep learning model behaviors and shows that adding more profiling traces as a single solution does not necessarily help improve generalization. In fact, we recognize the main problem to be the sub-optimal selection of hyperparameters, which is then difficult to resolve by simply adding more measurements. Instead, we propose to use small hyperparameter tweaks or regularization as techniques to resolve the problem.

Category / Keywords: secret-key cryptography / Side-channel analysis, Deep Learning, Overfitting, Generalization

Date: received 11 Mar 2022

Contact author: picek stjepan at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20220314:115340 (All versions of this report)

Short URL: ia.cr/2022/340


[ Cryptology ePrint archive ]