Paper 2024/558
Scoring the predictions: a way to improve profiling side-channel attacks
Abstract
Side-channel analysis is an important part of the security evaluations of hardware components and more specifically of those that include cryptographic algorithms. Profiling attacks are among the most powerful attacks as they assume the attacker has access to a clone device of the one under attack. Using the clone device allows the attacker to make a profile of physical leakages linked to the execution of algorithms. This work focuses on the characteristics of this profile and the information that can be extracted from its application to the attack traces. More specifically, looking at unsuccessful attacks, it shows that by carefully ordering the attack traces used and limiting their number, better results can be achieved with the same profile. Using this method allows us to consider the classical attack method, i.e. where the traces are randomly ordered, as the worst case scenario. The best case scenario is when the attacker is able to successfully order and select the best attack traces. A method for identifying efficient ordering when using deep learning models as profiles is also provided. A new loss function "Scoring loss" is dedicated to training machine learning models that give a score to the attack prediction and the score can be used to order the predictions.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Published elsewhere. Journal of Cryptographic Engineering
- DOI
- 10.1007/s13389-024-00346-4
- Keywords
- Side-Channel AnalysisTemplate attackDeep LearningLoss functionLearning to Rank
- Contact author(s)
-
damien robissout @ imdea org
lilian bossuet @ univ-st-etienne fr
amaury habrard @ univ-st-etienne fr - History
- 2024-04-10: approved
- 2024-04-10: received
- See all versions
- Short URL
- https://ia.cr/2024/558
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/558, author = {Damien Robissout and Lilian Bossuet and Amaury Habrard}, title = {Scoring the predictions: a way to improve profiling side-channel attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/558}, year = {2024}, doi = {10.1007/s13389-024-00346-4}, url = {https://eprint.iacr.org/2024/558} }