Paper 2024/167

Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack

Trevor Yap, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, Temasek Laboratories, Nanyang Technological University, Singapore
Dirmanto Jap, Temasek Laboratories, Nanyang Technological University, Singapore
Abstract

In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The generation of synthetic traces can help to improve attacks like profiling attacks. However, manually creating synthetic traces from actual traces is arduous. Therefore, automating this process of creating artificial traces is much needed. Recently, diffusion models have gained much recognition after beating another generative model known as Generative Adversarial Networks (GANs) in creating realistic images. We explore the usage of diffusion models in the domain of SCA. We proposed frameworks for a known mask setting and unknown mask setting in which the diffusion models could be applied. Under a known mask setting, we show that the traces generated under the proposed framework preserved the original leakage. Next, we demonstrated that the artificially created profiling data in the unknown mask setting can reduce the required attack traces for a profiling attack. This suggests that the artificially created profiling data from the trained diffusion model contains useful leakages to be exploited.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. AIHWS 2024
Keywords
Side-channelNeural NetworkDeep LearningProfiling attackGenerative ModelsDiffusion Model.
Contact author(s)
trevor yap @ ntu edu sg
djap @ ntu edu sg
History
2024-02-06: approved
2024-02-05: received
See all versions
Short URL
https://ia.cr/2024/167
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/167,
      author = {Trevor Yap and Dirmanto Jap},
      title = {Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack},
      howpublished = {Cryptology ePrint Archive, Paper 2024/167},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/167}},
      url = {https://eprint.iacr.org/2024/167}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.