Due to the constant increase and versatility of IoT devices that should keep sensitive information private, Side-Channel Analysis (SCA) attacks on embedded devices are gaining visibility in the industrial field. The integration and validation of countermeasures against SCA can be an expensive and cumbersome process, especially for the less experienced ones, and current certification procedures require to attack the devices under test using multiple SCA techniques and attack vectors, often implying a high degree of complexity. The goal of this paper is to ease one of the most crucial and tedious steps of profiling attacks i.e. the points of interest (POI) selection and hence assist the SCA evaluation process. To this end, we introduce the usage of Estimation of Distribution Algorithms (EDAs) in the SCA field in order to automatically tune the point of interest selection. We showcase our approach on several experimental use cases, including attacks on unprotected and protected AES implementations over distinct copies of the same device, dismissing in this way the portability issue.
翻译:由于IOT装置的不断增长和多功能性,应当保持敏感信息私密性,对嵌入装置的侧气道分析(SCA)攻击日益在工业领域引起注意,对SCA的反措施的整合和验证可能是一个昂贵和繁琐的过程,对经验较少的装置来说尤其如此,而目前的认证程序要求使用多种SCA技术和攻击矢量攻击试验中的装置,这往往意味着高度复杂。本文的目的是为了缓解最关键和最棘手的特征攻击步骤之一,即利益点选择,从而协助SCA的评估过程。为此,我们引入了在SCA字段中对分配算法(EDAs)进行估计的方法,以便自动调整利益选择点。我们展示了我们在若干实验性使用案例上的做法,包括攻击不受保护和保护的AES实施对同一装置不同副本的保护,从而排除了可转移性问题。