The EVIL Machine: Encode, Visualize and Interpret the Leakage - LIRMM - Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier Accéder directement au contenu
Communication Dans Un Congrès Année : 2023

The EVIL Machine: Encode, Visualize and Interpret the Leakage

Valence Cristiani
Philippe Maurine

Résumé

Unsupervised side-channel attacks allow extracting secret keys manipulated by cryptographic primitives through leakages of their physical implementations. As opposed to supervised attacks, they do not require a preliminary profiling of the target, constituting a broader threat since they imply weaker assumptions on the adversary model. Their downside is their requirement for some a priori knowledge on the leakage model of the device. On one hand, stochastic attacks such as the Linear Regression Analysis (LRA) allow for a flexible a priori, but are mostly limited to a univariate treatment of the traces. On the other hand, model-based attacks require an explicit formulation of the leakage model but have recently been extended to multidimensional versions allowing to benefit from the potential of Deep Learning (DL) techniques. The EVIL Machine Attack (EMA), introduced in this paper, aims at taking the best of both worlds. Inspired by generative adversarial networks, its architecture is able to recover a representation of the leakage model, which is then turned into a key distinguisher allowing flexible a priori. In addition, state-of-the-art DL techniques require 256 network trainings to conduct the attack. EMA requires only one, scaling down the time complexity of such attacks by a considerable factor. Simulations and real experiments show that EMA is applicable in cases where the adversary has very low knowledge on the leakage model, while significantly reducing the required number of traces compared to a classical LRA. Eventually, a generalization of EMA, able to deal with masked implementation is introduced.
Fichier principal
Vignette du fichier
2022-1476.pdf (6.24 Mo) Télécharger le fichier

Dates et versions

lirmm-04230167 , version 1 (05-10-2023)

Identifiants

Citer

Valence Cristiani, Maxime Lecomte, Philippe Maurine. The EVIL Machine: Encode, Visualize and Interpret the Leakage. SAC 2023 - 38th ACM/SIGAPP Symposium on Applied Computing, Mar 2023, Tallinn, Estonia. pp.1566-1575, ⟨10.1145/3555776.3577688⟩. ⟨lirmm-04230167⟩
9 Consultations
21 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More