Paper 2025/655

Taking AI-Based Side-Channel Attacks to a New Dimension

Lucas David Meier, CSEM
Felipe Valencia, CSEM
Cristian-Alexandru Botocan, CSEM
Damian Vizár, CSEM
Abstract

This paper revisits the Hamming Weight (HW) labelling function for machine learning assisted side channel attacks. Contrary to what has been suggested by previous works, our investigation shows that, when paired with modern deep learning architectures, appropriate pre-processing and normalization techniques; it can perform as well as the popular identity labelling functions and sometimes even beat it. In fact, we hereby introduce a new machine learning method, dubbed, that helps solve the class imbalance problem associated to HW, while significantly improving the performance of unprofiled attacks. We additionally release our new, easy to use python package that we used in our experiments, implementing a broad variety of machine learning driven side channel attacks as open source, along with a new dataset AES_nRF, acquired on the nRF52840 SoC.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. Major revision. CASCADE 2025
Keywords
Profiled Side-Channel AttacksUnprofiled Side-Channel AttacksDeep LearningSoftmax Function
Contact author(s)
lucas meier @ csem ch
andres valencia @ csem ch
botocan christian @ gmail com
damian vizAr @ csem ch
History
2025-04-13: approved
2025-04-10: received
See all versions
Short URL
https://ia.cr/2025/655
License
Creative Commons Attribution-ShareAlike
CC BY-SA

BibTeX

@misc{cryptoeprint:2025/655,
      author = {Lucas David Meier and Felipe Valencia and Cristian-Alexandru Botocan and Damian Vizár},
      title = {Taking {AI}-Based Side-Channel Attacks to a New Dimension},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/655},
      year = {2025},
      url = {https://eprint.iacr.org/2025/655}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.