InfoNEAT: Information Theory-based NeuroEvolution of Augmenting Topologies for Side-channel Analysis

04/30/2021
by   Rabin Yu Acharya, et al.
0

Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract the secret key. When combined with advanced methods in neural networks (NNs), profiled SCA can successfully attack even those crypto-cores assumed to be protected against SCA. Despite the rise in the number of studies devoted to NN-based SCA, existing methods could not systematically address the challenges involved in the NN-based SCA. A range of questions has remained unanswered, namely: how to choose a NN with an adequate size, how to tune the NN's hyperparameters, when to stop the training, and how to explain the performance of the NN model in quantitative terms, in the context of SCA. Our proposed approach, "InfoNEAT," tackles these issues in a natural way. InfoNEAT relies on the concept of evolution of NNs (both the network architecture and parameters, so-called neuroevolution), enhanced by information-theoretic metrics to guide the evolution, halt it with a novel stopping criteria, and improve time-complexity and memory footprint. The performance of InfoNEAT is evaluated by applying it to publicly available datasets composed of real side-channel measurements. In addition to the considerable advantages regarding the automated configuration of NNs, InfoNEAT demonstrates significant improvements over other approaches including a reduction in the number of epochs and width of the NN (i.e., the number of nodes in a layer) by factors of at least 1.25 and 6.66, respectively. According to our assessment and on the basis of our results, this is indeed achieved without any deterioration in the performance of SCA compared to the state-of-the-art NN-based methods.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/26/2020

A Protection against the Extraction of Neural Network Models

Given oracle access to a Neural Network (NN), it is possible to extract ...
research
08/07/2022

HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation

Recent work has highlighted the risks of intellectual property (IP) pira...
research
05/16/2021

Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds

Measuring the information leakage is critical for evaluating practical s...
research
09/04/2022

Concatenated Classic and Neural (CCN) Codes: ConcatenatedAE

Small neural networks (NNs) used for error correction were shown to impr...
research
04/22/2022

Exploring Hidden Semantics in Neural Networks with Symbolic Regression

Many recent studies focus on developing mechanisms to explain the black-...
research
08/26/2022

Reducing Computational Complexity of Neural Networks in Optical Channel Equalization: From Concepts to Implementation

In this paper, a new methodology is proposed that allows for the low-com...
research
02/25/2019

Modularity as a Means for Complexity Management in Neural Networks Learning

Training a Neural Network (NN) with lots of parameters or intricate arch...

Please sign up or login with your details

Forgot password? Click here to reset