Hound: Locating Cryptographic Primitives in Desynchronized Side-Channel Traces Using Deep-Learning
- URL: http://arxiv.org/abs/2408.06296v2
- Date: Mon, 16 Sep 2024 11:20:45 GMT
- Title: Hound: Locating Cryptographic Primitives in Desynchronized Side-Channel Traces Using Deep-Learning
- Authors: Davide Galli, Giuseppe Chiari, Davide Zoni,
- Abstract summary: This work introduces Hound, a novel deep learning-based pipeline to locate the execution of cryptographic primitives within a side-channel trace.
Hound has been validated through successful attacks on various cryptographic primitives executed on an FPGA-based system-on-chip incorporating a RISC-V CPU.
- Score: 1.0923877073891446
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Side-channel attacks allow to extract sensitive information from cryptographic primitives by correlating the partially known computed data and the measured side-channel signal. Starting from the raw side-channel trace, the preprocessing of the side-channel trace to pinpoint the time at which each cryptographic primitive is executed, and, then, to re-align all the collected data to this specific time represent a critical step to setup a successful side-channel attack. The use of hiding techniques has been widely adopted as a low-cost solution to hinder the preprocessing of side-channel traces thus limiting side-channel attacks in real scenarios. This work introduces Hound, a novel deep learning-based pipeline to locate the execution of cryptographic primitives within the side-channel trace even in the presence of trace deformations introduced by the use of dynamic frequency scaling actuators. Hound has been validated through successful attacks on various cryptographic primitives executed on an FPGA-based system-on-chip incorporating a RISC-V CPU, while dynamic frequency scaling is active. Experimental results demonstrate the possibility of identifying the cryptographic primitives in DFS-deformed side-channel traces.
Related papers
- Unveiling ECC Vulnerabilities: LSTM Networks for Operation Recognition in Side-Channel Attacks [6.373405051241682]
We propose a novel approach for performing side-channel attacks on elliptic curve cryptography.
We adopt a long-short-term memory (LSTM) neural network to analyze a power trace and identify patterns of operation.
We show that current countermeasures, specifically the coordinate randomization technique, are not sufficient to protect against side channels.
arXiv Detail & Related papers (2025-02-24T17:02:40Z) - Power side-channel leakage localization through adversarial training of deep neural networks [10.840434597980723]
Supervised deep learning has emerged as an effective tool for carrying out power side-channel attacks on cryptographic implementations.
We propose a technique for identifying which timesteps in a power trace are responsible for leaking a cryptographic key.
arXiv Detail & Related papers (2024-10-29T18:04:41Z) - A Deep-Learning Technique to Locate Cryptographic Operations in Side-Channel Traces [4.746461615041115]
Side-channel attacks allow extracting secret information from the execution of cryptographic primitives.
This paper presents a novel deep-learning technique to locate the time instant in which the target computed cryptographic operations are executed.
arXiv Detail & Related papers (2024-02-29T11:02:47Z) - Spoofing Attack Detection in the Physical Layer with Robustness to User
Movement [20.705184880085557]
In a spoofing attack, an attacker impersonates a legitimate user to access or modify data belonging to the latter.
This paper proposes a scheme that combines the decisions of a position-change detector based on a deep neural network to distinguish spoofing from movement.
arXiv Detail & Related papers (2023-10-17T07:18:03Z) - Joint Channel Estimation and Feedback with Masked Token Transformers in
Massive MIMO Systems [74.52117784544758]
This paper proposes an encoder-decoder based network that unveils the intrinsic frequency-domain correlation within the CSI matrix.
The entire encoder-decoder network is utilized for channel compression.
Our method outperforms state-of-the-art channel estimation and feedback techniques in joint tasks.
arXiv Detail & Related papers (2023-06-08T06:15:17Z) - Disentangled Representation Learning for RF Fingerprint Extraction under
Unknown Channel Statistics [77.13542705329328]
We propose a framework of disentangled representation learning(DRL) that first learns to factor the input signals into a device-relevant component and a device-irrelevant component via adversarial learning.
The implicit data augmentation in the proposed framework imposes a regularization on the RFF extractor to avoid the possible overfitting of device-irrelevant channel statistics.
Experiments validate that the proposed approach, referred to as DR-RFF, outperforms conventional methods in terms of generalizability to unknown complicated propagation environments.
arXiv Detail & Related papers (2022-08-04T15:46:48Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - On the Use of CSI for the Generation of RF Fingerprints and Secret Keys [7.373772263534902]
This paper presents a systematic approach to use channel state information for authentication and secret key distillation for physical layer security (PLS)
We use popular machine learning (ML) methods and signal processing-based approaches to disentangle the large scale fading and be used as a source of uniqueness, from the small scale fading, to be treated as a source of shared entropy secret key generation (SKG)
Our simulation results demonstrate that the extracted part of the channel state information (CSI) vectors are statistically independent.
arXiv Detail & Related papers (2021-10-28T20:03:17Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Learning from Heterogeneous EEG Signals with Differentiable Channel
Reordering [51.633889765162685]
CHARM is a method for training a single neural network across inconsistent input channels.
We perform experiments on four EEG classification datasets and demonstrate the efficacy of CHARM.
arXiv Detail & Related papers (2020-10-21T12:32:34Z) - DeepSIC: Deep Soft Interference Cancellation for Multiuser MIMO
Detection [98.43451011898212]
In multiuser multiple-input multiple-output (MIMO) setups, where multiple symbols are simultaneously transmitted, accurate symbol detection is challenging.
We propose a data-driven implementation of the iterative soft interference cancellation (SIC) algorithm which we refer to as DeepSIC.
DeepSIC learns to carry out joint detection from a limited set of training samples without requiring the channel to be linear.
arXiv Detail & Related papers (2020-02-08T18:31:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.