TY - GEN
T1 - Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling.
AU - Hayoon, Hen
AU - Oren, Yossi
N1 - Publisher Copyright:
© 2022, Springer Nature Switzerland AG.
PY - 2022/6/23
Y1 - 2022/6/23
N2 - Template attacks are one of the most powerful classes of side-channel attacks. Template attacks begin with an offline step, in which the side-channel traces are profiled, and decoders are created for each side-channel leak. In this paper, we analyze the compression step of the trace profiling process. This compression step, which is a central part of the decoder’s training process, is used to reduce the amount of time, memory consumption, and data required to successfully perform the attack; various practical methods have been proposed for this step, including one which uses an efficient means both for selecting the points of interest (POI) in the power trace and for preprocessing noisy data. We investigate ways to improve the efficiency of the attack by implementing several compression methods which select the most informative power consumption samples from power traces. We develop a unique dedicated evaluation system to compare the performance of various decoders with different compression methods on real-world power traces. Our findings indicate that our proposed decoder for side-channel traces outperforms the current state of art in terms of speed, resource consumption, and accuracy. We also demonstrate our decoder’s effectiveness under resource-constrained conditions, and show that it achieves over 70% accuracy even if there are fewer than 1,000 traces in the profiling phase.
AB - Template attacks are one of the most powerful classes of side-channel attacks. Template attacks begin with an offline step, in which the side-channel traces are profiled, and decoders are created for each side-channel leak. In this paper, we analyze the compression step of the trace profiling process. This compression step, which is a central part of the decoder’s training process, is used to reduce the amount of time, memory consumption, and data required to successfully perform the attack; various practical methods have been proposed for this step, including one which uses an efficient means both for selecting the points of interest (POI) in the power trace and for preprocessing noisy data. We investigate ways to improve the efficiency of the attack by implementing several compression methods which select the most informative power consumption samples from power traces. We develop a unique dedicated evaluation system to compare the performance of various decoders with different compression methods on real-world power traces. Our findings indicate that our proposed decoder for side-channel traces outperforms the current state of art in terms of speed, resource consumption, and accuracy. We also demonstrate our decoder’s effectiveness under resource-constrained conditions, and show that it achieves over 70% accuracy even if there are fewer than 1,000 traces in the profiling phase.
UR - http://www.scopus.com/inward/record.url?scp=85134159763&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-07689-3_3
DO - 10.1007/978-3-031-07689-3_3
M3 - Conference contribution
SN - 978-3-031-07688-6
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 29
EP - 46
BT - Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Proceedings
A2 - Dolev, Shlomi
A2 - Meisels, Amnon
A2 - Katz, Jonathan
PB - Springer Cham
T2 - 6th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2022
Y2 - 30 June 2022 through 1 July 2022
ER -