Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract the secret key. When combined with advanced methods in neural networks (NNs), profiled SCA can successfully attack even those crypto-cores assumed to be protected against SCA. Despite the rise in the number of studies devoted to NN-based SCA, a range of questions has remained unanswered, namely: how to choose an NN with an adequate configuration, how to tune the NN's hyperparameters, when to stop the training, etc. Our proposed approach, ``InfoNEAT,'' tackles these issues in a natural way. InfoNEAT relies on the concept of neural structure search, enhanced by information-theoretic metrics to guide the evolution, halt it with novel stopping criteria, and improve time-complexity and memory footprint. The performance of InfoNEAT is evaluated by applying it to publicly available datasets composed of real side-channel measurements. In addition to the considerable advantages regarding the automated configuration of NNs, InfoNEAT demonstrates significant improvements over other approaches for effective key recovery in terms of the number of epochs (e.g.,x6 faster) and the number of attack traces compared to both MLPs and CNNs (e.g., up to 1000s fewer traces to break a device) as well as a reduction in the number of trainable parameters compared to MLPs (e.g., by the factor of up to 32). Furthermore, through experiments, it is demonstrated that InfoNEAT's models are robust against noise and desynchronization in traces.
翻译:剖析侧通道分析(SCA) 利用加密实施过程中的漏出来提取秘密钥匙。 当与神经网络(NNS)的先进方法相结合时, 剖析的SCA可以成功地攻击甚至那些假定要保护不受 CAS 的加密核心。 尽管专门为NN CA 进行的研究数量有所增加,但仍有一系列问题没有得到解答,即: 如何选择一个配置适当的 NN, 何时如何调整NNT的超参数, 何时停止培训等。 我们的拟议方法“InfONEAT” 自然地处理这些问题。 InNEAT 依靠神经结构搜索的概念, 借助信息理论测量来引导进化, 停止使用新的停止标准, 改进时间的兼容性和记忆足迹。 信息NCAAT的绩效通过将它应用到公开的由真实侧屏网测量数组成的数据集。 除了在NNNP的自动配置方面有很大的优势之外, InfONEAT还表明, 以自然的方式解决这些问题。 InNEATTAT 展示了神经结构搜索中的其他方法有了显著的改进,, 以新的停止 速度比 NEM 的轨道的频率要小。