Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3605769.3623996acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open Access

Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis

Published:26 November 2023Publication History

ABSTRACT

This paper provides a novel perspective on improving the efficiency of side-channel analysis by applying two deep feature loss functions: Soft Nearest Neighbor (SoftNN) and Center loss. By leveraging these loss functions during the deep neural networks (DNNs) training phase, our study illuminates how profiling attacks can be more powerful. Deep feature loss functions incorporate the outputs from the DNN's intermediate layers into their computations, which reduces the distance between similar data points. As such, these techniques enhance the DNN's ability to generate more precise and meaningful representations, thereby improving its discriminative power. This paper presents empirical evidence illustrating the effectiveness of SoftNN and Center loss in strengthening DNN-based side-channel attacks. For instance, when using Center loss together with the focal loss ratio (FLR), it requires the least number of traces to break the ASCADf dataset. On the other hand, applying SoftNN with FLR successfully recovers the key for the ASCADr dataset with the least traces. The insights presented in this study can act as a baseline for more advanced investigations into the utility of such loss functions in deep learning-based side-channel analysis.

References

  1. Ryad Benadjila, Emmanuel Prouff, Ré mi Strullu, Eleonora Cagli, and Cé cile Dumas. 2020. Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. , Vol. 10, 2 (2020), 163--188. https://doi.org/10.1007/s13389-019-00220--8Google ScholarGoogle ScholarCross RefCross Ref
  2. Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff. 2017. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures. In Cryptographic Hardware and Embedded Systems -- CHES 2017, Wieland Fischer and Naofumi Homma (Eds.). Springer International Publishing, Cham, 45--68.Google ScholarGoogle ScholarCross RefCross Ref
  3. Morris Dworkin, Elaine Barker, James Nechvatal, James Foti, Lawrence Bassham, E. Roback, and James Dray. 2001. Advanced Encryption Standard (AES). https://doi.org/10.6028/NIST.FIPS.197Google ScholarGoogle ScholarCross RefCross Ref
  4. Nicholas Frosst, Nicolas Papernot, and Geoffrey Hinton. 2019. Analyzing and Improving Representations with the Soft Nearest Neighbor Loss. arxiv: 1902.01889 [stat.ML]Google ScholarGoogle Scholar
  5. Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press. http://www.deeplearningbook.org.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Maikel Kerkhof, Lichao Wu, Guilherme Perin, and Stjepan Picek. 2022. Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis. In Constructive Side-Channel Analysis and Secure Design, Josep Balasch and Colin O'Flynn (Eds.). Springer International Publishing, Cham, 29--48.Google ScholarGoogle Scholar
  7. Maikel Kerkhof, Lichao Wu, Guilherme Perin, and Stjepan Picek. 2023. No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis. Journal of Cryptographic Engineering , Vol. 13, 3 (May 2023), 311--324. https://doi.org/10.1007/s13389-023-00320--6Google ScholarGoogle ScholarCross RefCross Ref
  8. Kussul, Nataliia and Lavreniuk, Mykola and Skakun, Sergii and Shelestov, Andrii. 2017. Deep Learning Classification of Land Cover and Crop Types Using Remote Sensing Data. IEEE Geoscience and Remote Sensing Letters , Vol. 14, 5 (2017), 778--782. https://doi.org/10.1109/LGRS.2017.2681128Google ScholarGoogle ScholarCross RefCross Ref
  9. Tsung-Yi Lin, Priya Goyal, Ross Girshick, Kaiming He, and Piotr Dollár. 2017. Focal loss for dense object detection. In Proceedings of the IEEE international conference on computer vision. 2980--2988.Google ScholarGoogle ScholarCross RefCross Ref
  10. Lo"ic Masure, Cécile Dumas, and Emmanuel Prouff. 2020. A comprehensive study of deep learning for side-channel analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems (2020), 348--375.Google ScholarGoogle Scholar
  11. Colin O'Flynn and Zhizhang David Chen. 2014. ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research. In International Workshop on Constructive Side-Channel Analysis and Secure Design.Google ScholarGoogle Scholar
  12. Guilherme Perin, Lichao Wu, and Stjepan Picek. 2022a. Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, 4 (Aug. 2022), 828--861. https://doi.org/10.46586/tches.v2022.i4.828--861Google ScholarGoogle ScholarCross RefCross Ref
  13. Guilherme Perin, Lichao Wu, and Stjepan Picek. 2022b. I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis. Cryptology ePrint Archive, Paper 2022/1087. https://eprint.iacr.org/2022/1087 https://eprint.iacr.org/2022/1087.Google ScholarGoogle Scholar
  14. Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, and Francesco Regazzoni. 2018. The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations, volume=2019. IACR Transactions on Cryptographic Hardware and Embedded Systems 1 (Nov. 2018), 209--237. https://doi.org/10.13154/tches.v2019.i1.209--237Google ScholarGoogle ScholarCross RefCross Ref
  15. Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, and Lejla Batina. 2023. SoK: Deep Learning-Based Physical Side-Channel Analysis. ACM Comput. Surv. , Vol. 55, 11, Article 227 (feb 2023), bibinfonumpages35 pages. https://doi.org/10.1145/3569577Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jorai Rijsdijk, Lichao Wu, Guilherme Perin, and Stjepan Picek. 2021. Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, 3 (Jul. 2021), 677--707. https://doi.org/10.46586/tches.v2021.i3.677--707Google ScholarGoogle ScholarCross RefCross Ref
  17. Ruslan Salakhutdinov and Geoff Hinton. 2007. Learning a Nonlinear Embedding by Preserving Class Neighbourhood Structure. In Proceedings of the Eleventh International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research, Vol. 2), Marina Meila and Xiaotong Shen (Eds.). PMLR, San Juan, Puerto Rico, 412--419. https://proceedings.mlr.press/v2/salakhutdinov07a.htmlGoogle ScholarGoogle Scholar
  18. Yandong Wen, Kaipeng Zhang, Zhifeng Li, and Yu Qiao. 2016. A Discriminative Feature Learning Approach for Deep Face Recognition. In Computer Vision -- ECCV 2016, Bastian Leibe, Jiri Matas, Nicu Sebe, and Max Welling (Eds.). Springer International Publishing, Cham, 499--515.Google ScholarGoogle ScholarCross RefCross Ref
  19. Lichao Wu, Guilherme Perin, and Stjepan Picek. 2022a. I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis. IEEE Transactions on Emerging Topics in Computing (2022), 1--12. https://doi.org/10.1109/TETC.2022.3218372Google ScholarGoogle ScholarCross RefCross Ref
  20. Lichao Wu, Guilherme Perin, and Stjepan Picek. 2022b. The Best of Two Worlds: Deep Learning-assisted Template Attack. IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, 3 (Jun. 2022), 413--437. https://doi.org/10.46586/tches.v2022.i3.413--437Google ScholarGoogle ScholarCross RefCross Ref
  21. Baoguo Yuan, Junfeng Wang, Dong Liu, Wen Guo, Peng Wu, and Xuhua Bao. 2020. Byte-level malware classification based on markov images and deep learning. Computers & Security , Vol. 92 (2020), 101740. https://doi.org/10.1016/j.cose.2020.101740Google ScholarGoogle ScholarCross RefCross Ref
  22. Gabriel Zaid, Lilian Bossuet, François Dassance, Amaury Habrard, and Alexandre Venelli. 2020. Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, 1 (Dec. 2020), 25--55. https://doi.org/10.46586/tches.v2021.i1.25--55Google ScholarGoogle ScholarCross RefCross Ref
  23. Gabriel Zaid, Lilian Bossuet, Amaury Habrard, and Alexandre Venelli. 2019. Methodology for Efficient CNN Architectures in Profiling Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020, 1 (Nov. 2019), 1--36. https://doi.org/10.13154/tches.v2020.i1.1--36Google ScholarGoogle ScholarCross RefCross Ref
  24. Jiajia Zhang, Mengce Zheng, Jiehui Nan, Honggang Hu, and Nenghai Yu. 2020. A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data. IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020, 3 (Jun. 2020), 73--96. https://doi.org/10.13154/tches.v2020.i3.73--96 ioGoogle ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader