International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks

Authors:
Xiangjun Lu , Shanghai Jiao Tong University, Shanghai, China
Chi Zhang , Shanghai Jiao Tong University, Shanghai, China
Pei Cao , Shanghai Jiao Tong University, Shanghai, China
Dawu Gu , Shanghai Jiao Tong University, Shanghai, China
Haining Lu , Shanghai Jiao Tong University, Shanghai, China
Download:
DOI: 10.46586/tches.v2021.i3.235-274
URL: https://tches.iacr.org/index.php/TCHES/article/view/8974
Search ePrint
Search Google
Abstract: With the renaissance of deep learning, the side-channel community also notices the potential of this technology, which is highly related to the profiling attacks in the side-channel context. Many papers have recently investigated the abilities of deep learning in profiling traces. Some of them also aim at the countermeasures (e.g., masking) simultaneously. Nevertheless, so far, all of these papers work with an (implicit) assumption that the number of time samples in raw traces can be reduced before the profiling, i.e., the position of points of interest (PoIs) can be manually located. This is arguably the most challenging part of a practical black-box analysis targeting an implementation protected by masking. Therefore, we argue that to fully utilize the potential of deep learning and get rid of any manual intervention, the end-to-end profiling directly mapping raw traces to target intermediate values is demanded.In this paper, we propose a neural network architecture that consists of encoders, attention mechanisms and a classifier, to conduct the end-to-end profiling. The networks built by our architecture could directly classify the traces that contain a large number of time samples (i.e., raw traces without manual feature extraction) while whose underlying implementation is protected by masking. We validate our networks on several public datasets, i.e., DPA contest v4 and ASCAD, where over 100,000 time samples are directly used in profiling. To our best knowledge, we are the first that successfully carry out end-to-end profiling attacks. The results on the datasets indicate that our networks could get rid of the tricky manual feature extraction. Moreover, our networks perform even systematically better (w.r.t. the number of traces in attacks) than those trained on the reduced traces. These validations imply our approach is not only a first but also a concrete step towards end-to-end profiling attacks in the side-channel context.
Video from TCHES 2021
BibTeX
@article{tches-2021-31284,
  title={Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks},
  journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
  publisher={Ruhr-Universität Bochum},
  volume={2021, Issue 3},
  pages={235-274},
  url={https://tches.iacr.org/index.php/TCHES/article/view/8974},
  doi={10.46586/tches.v2021.i3.235-274},
  author={Xiangjun Lu and Chi Zhang and Pei Cao and Dawu Gu and Haining Lu},
  year=2021
}