Deep learning-based Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices

Author(s):  
Virinchi Tirumaladass ◽  
Stefan Axelsson ◽  
Mark Dougherty ◽  
Muhammed Ahsan Rasool ◽  
Mohamed Hamdy Eldefrawy
2021 ◽  
Author(s):  
Jiajun Xu ◽  
Meng Li ◽  
Lixin Liang ◽  
Yiwei Zhang ◽  
Shaohua Xiang ◽  
...  

ETRI Journal ◽  
2020 ◽  
Vol 42 (2) ◽  
pp. 292-304 ◽  
Author(s):  
Sunghyun Jin ◽  
Suhri Kim ◽  
HeeSeok Kim ◽  
Seokhie Hong

Author(s):  
Nikita Veshchikov ◽  
Stephane Fernandes Medeiros ◽  
Liran Lerman

IoT devices have very strong requirements on all the resources such as memory, randomness, energy and execution time. This paper proposes a number of scalable shuffling techniques as countermeasures against side channel analysis. Some extensions of an existing technique called Random Start Index (RSI) are suggested in this paper. Moreover, two new shuffling techniques Reverse Shuffle (RS) and Sweep Swap Shuffle (SSS) are described within their possible extensions. Extensions of RSI, RS and SSS might be implemented in a constrained environment with a small data and time overhead. Each of them might be implemented using different amount of randomness and thus, might be fine-tuned according to requirements and constraints of a cryptographic system such as time, memory, available number of random bits, etc. RSI, RS, SSS and their extensions are described using SubBytes operation of AES-128 block cipher as an example, but they might be used with different operations of AES as well as with other algorithms. This paper also analyses RSI, RS and SSS by comparing their properties such as number of total permutations that might be generated using a fixed number of random bits, data complexity, time overhead and evaluates their resistance against some known side-channel attacks such as correlation power analysis and template attack. Several of proposed shuffling schemes are implemented on a 8-bit microcontroller that uses them to shuffle the first and the last rounds of AES-128.  


Author(s):  
Anh-Tuan Hoang ◽  
Neil Hanley ◽  
Maire O’Neill

Deep learning (DL) has proven to be very effective for image recognition tasks, with a large body of research on various model architectures for object classification. Straight-forward application of DL to side-channel analysis (SCA) has already shown promising success, with experimentation on open-source variable key datasets showing that secret keys can be revealed with 100s traces even in the presence of countermeasures. This paper aims to further improve the application of DL for SCA, by enhancing the power of DL when targeting the secret key of cryptographic algorithms when protected with SCA countermeasures. We propose a new model, CNN-based model with Plaintext feature extension (CNNP) together with multiple convolutional filter kernel sizes and structures with deeper and narrower neural networks, which has empirically proven its effectiveness by outperforming reference profiling attack methods such as template attacks (TAs), convolutional neural networks (CNNs) and multilayer perceptron (MLP) models. Our model generates state-of-the art results when attacking the ASCAD variable-key database, which has a restricted number of training traces per key, recovering the key within 40 attack traces in comparison with order of 100s traces required by straightforward machine learning (ML) application. During the profiling stage an attacker needs no additional knowledge on the implementation, such as the masking scheme or random mask values, only the ability to record the power consumption or electromagnetic field traces, plaintext/ciphertext and the key. Additionally, no heuristic pre-processing is required in order to break the high-order masking countermeasures of the target implementation.


2021 ◽  
pp. 255-269
Author(s):  
Varsha Satheesh Kumar ◽  
S. Dillibabu Shanmugam ◽  
N. Sarat Chandra Babu

2019 ◽  
Vol 29 ◽  
pp. S94-S103 ◽  
Author(s):  
Asanka Sayakkara ◽  
Nhien-An Le-Khac ◽  
Mark Scanlon

2019 ◽  
Vol 10 (2) ◽  
pp. 163-188 ◽  
Author(s):  
Ryad Benadjila ◽  
Emmanuel Prouff ◽  
Rémi Strullu ◽  
Eleonora Cagli ◽  
Cécile Dumas

Sign in / Sign up

Export Citation Format

Share Document