Skip to main content
Log in

Side-channel analysis based on Siamese neural network

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In recent years, the combination of deep learning and side-channel analysis has received extensive attention. Previous research has shown that the key recovery problem can be transformed into a classification problem. The performance of these models strongly depends on the size of the dataset and the number of instances in each target class. The training time is very long. In this paper, the key recovery problem is transformed into a similarity measurement problem in Siamese neural networks. We use simulated power traces and true power traces to form power pairs to augment data and simplify key recovery steps. The trace pairs are selected based on labels and added to the training to improve model performance. The model adopts a Siamese, CNN-based architecture, and it can evaluate the similarity between the inputs. The correct key is revealed by the similarity of different trace pairs. In experiments, three datasets are used to evaluate our method. The results show that the proposed method can be successfully trained with 1000 power traces and has excellent attack efficiency and training speed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availability

Data will be made available on request.

References

  1. Li J-H (2018) Cyber security meets artificial intelligence: a survey. Front Inf Technol Electron Eng 19(12):1462–1474

    Article  ADS  Google Scholar 

  2. Chong K-S, Ng J-S, Chen J, Lwin NKZ, Kyaw NA, Ho W-G, Chang J, Gwee B-H (2021) Dual-hiding side-channel-attack resistant FPGA-based asynchronous-logic AES: design, countermeasures and evaluation. IEEE J Emerging Sel Top Circuits Syst 11(2):343–356

    Article  CAS  ADS  Google Scholar 

  3. Moon J, Jung IY, Park JH (2018) IoT application protection against power analysis attack. Comput Electr Eng 67:566–578

    Article  Google Scholar 

  4. Saeedi E, Kong Y, Hossain M et al (2017) Side-channel attacks and learning-vector quantization. Front Inf Technol Electron Eng 18(4):511–518

    Article  Google Scholar 

  5. Wei Y, Xu P, Rong Y (2019) Related-key impossible differential cryptanalysis on lightweight cipher twine. J Ambient Intell Humaniz Comput 10(2):509–517

    Article  Google Scholar 

  6. Van Cleemput J, De Sutter B, De Bosschere K (2017) Adaptive compiler strategies for mitigating timing side channel attacks. IEEE Trans Dependable Secure Comput 17(1):35–49

    Article  Google Scholar 

  7. Ding Y, Shi Y, Wang A, Wang Y, Zhang G (2020) Block-oriented correlation power analysis with bitwise linear leakage: an artificial intelligence approach based on genetic algorithms. Future Gener Comput Syst 106:34–42

    Article  Google Scholar 

  8. Zhang F, Guo S, Zhao X, Wang T, Yang J, Standaert F-X, Gu D (2016) A framework for the analysis and evaluation of algebraic fault attacks on lightweight block ciphers. IEEE Trans Inf Forensics Secur 11(5):1039–1054

    Article  CAS  Google Scholar 

  9. Go B-S, Le D-V, Song M-G, Park M, Yu I-K (2018) Design and electromagnetic analysis of an induction-type Coilgun system with a pulse power module. IEEE Trans Plasma Sci 47(1):971–976

    Article  ADS  Google Scholar 

  10. Samadi Bokharaie V, Jahanian A (2022) Power side-channel leakage assessment and locating the exact sources of leakage at the early stages of asic design process. J Supercomput 1–26

  11. Park A, Han D-G (2016) Chosen ciphertext simple power analysis on software 8-bit implementation of ring-LWE encryption. In: 2016 IEEE Asian hardware-oriented security and trust (AsianHOST). IEEE, pp 1–6

  12. Chakraborty A, Mondal A, Srivastava A (2017) Correlation power analysis attack against STT-MRAM based cyptosystems. IACR Cryptol. ePrint Arch. 413

  13. Chari S, Rao JR, Rohatgi P (2002) Template attacks. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 13–28

  14. Maghrebi H, Portigliatti T, Prouff E (2016) Breaking cryptographic implementations using deep learning techniques. In: International Conference on Security, Privacy, and Applied Cryptography Engineering. Springer, Berlin, pp 3–26

  15. Benadjila R, Prouff E, Strullu R, Cagli E, Dumas C (2020) Deep learning for side-channel analysis and introduction to ASCAD database. J Cryptogr Eng 10(2):163–188

    Article  Google Scholar 

  16. Zaid G, Bossuet L, Habrard A, Venelli A (2020) Methodology for efficient CNN architectures in profiling attacks. IACR Trans Cryptograph Hardware Embed Syst 2020(1):1–36

    Google Scholar 

  17. Masure L, Dumas C, Prouff E (2020) A comprehensive study of deep learning for side-channel analysis. IACR Trans Cryptographic Hardware Embed Syst 348–375

  18. Perin G, Chmielewski Ł, Picek S (2020) Strength in numbers: improving generalization with ensembles in machine learning-based profiled side-channel analysis. IACR Trans Cryptographic Hardware Embed Syst 337–364

  19. Ou Y, Li L, Li D, Zhang J (2022) ESRM: an efficient regression model based on random kernels for side channel analysis. Int J Mach Learn Cybernet 1–11

  20. Zhang L, Xing X, Fan J, Wang Z, Wang S (2020) Multilabel deep learning-based side-channel attack. IEEE Trans Comput Aided Des Integr Circuits Syst 40(6):1207–1216

    Article  Google Scholar 

  21. Wu L, Perin G, Picek S (2022) The best of two worlds: deep learning-assisted template attack. IACR Trans Cryptographic Hardware Embed Syst 413–437

  22. Mukhtar N, Batina L, Picek S, Kong Y (2022) Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices. In: Cryptographers Track at the RSA Conference. Springer, Berlin, pp 297–321

  23. Picek S, Heuser A, Perin G, Guilley S (2019) Profiling side-channel analysis in the efficient attacker framework. Cryptology ePrint Archive

  24. Wang P, Chen P, Luo Z, Dong G, Zheng M, Yu N, Hu H (2020) Enhancing the performance of practical profiling side-channel attacks using conditional generative adversarial networks. arXiv preprint arXiv:2007.05285

  25. Picek S, Heuser A, Jovic A, Knezevic K, Richmond T (2018) Improving side-channel analysis through semi-supervised learning. In: International Conference on Smart Card Research and Advanced Applications. Springer, Berlin, pp. 35–50

  26. Kim J, Picek S, Heuser A, Bhasin S, Hanjalic A (2019) Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Trans Cryptographic Hardware Embed Syst 148–179

  27. Ito A, Saito K, Ueno R, Homma N (2021) Imbalanced data problems in deep learning-based side-channel attacks: analysis and solution. IEEE Trans Inf Forensics Secur 16:3790–3802

    Article  Google Scholar 

  28. Hu F, Wang H, Wang J (2022) Cross subkey side channel analysis based on small samples. Sci Rep 12(1):1–11

    CAS  ADS  Google Scholar 

  29. Zhu J, Jang-Jaccard J, Singh A, Welch I, Harith A-S, Camtepe S (2022) A few-shot meta-learning based Siamese neural network using entropy features for ransomware classification. Comput Secur 117:102691

    Article  Google Scholar 

  30. Koch G, Zemel R (2015) Salakhutdinov, Siamese neural networks for one-shot image recognition. In: ICML deep learning workshop, vol 2

  31. Lee N, Hong S, Kim H (2022) Single-trace attack using one-shot learning with Siamese network in non-profiled setting. IEEE Access

  32. Fumaroli G, Martinelli A, Prouff E, Rivain M (2010) Affine masking against higher-order side channel analysis, In: International workshop on selected areas in cryptography. Springer, Berlin, pp 262–280

  33. Karpukhin V, Oğuz B, Min S, Lewis P, Wu L, Edunov S, Chen D, Yih W-t (2020) Dense passage retrieval for open-domain question answering. arXiv preprint arXiv:2004.04906

  34. Martinasek Z, Dzurenda P, Malina L (2016) Profiling power analysis attack based on MLP in DPA contest v4. 2. In: 2016 39th International Conference on Telecommunications and Signal Processing (TSP). IEEE, pp 223–226

  35. Wu L, Perin G, Picek S (2022) On the evaluation of deep learning-based side-channel analysis. In: International Workshop on Constructive Side-Channel Analysis and Secure Design. Springer, Berlin, pp 49–71

  36. Zaid G, Bossuet L, Carbone M, Habrard A, Venelli A (2023) Conditional variational autoencoder based on stochastic attacks. IACR Trans Cryptographic Hardware Embed Syst 310–357

  37. Chen X, He K (2021) Exploring simple Siamese representation learning. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp 15750–15758

Download references

Acknowledgements

We are grateful to the anonymous reviewers for their insightful comments. This work is supported by the Hunan Provincial Natural Science Foundation of China (2022JJ30103), “the 14th Five-Year Plan” Key Disciplines and Application-oriented Special Disciplines of Hunan Province (Xiangjiaotong [2022] 351), the Science and Technology Innovation Program of Hunan Province (2016TP1020), Open fund project of Hunan Provincial Key Laboratory of Intelligent Information Processing and Application for Hengyang Normal University (2022HSKFJJ011, 2021HSKFJJ038).

Author information

Authors and Affiliations

Authors

Contributions

DL helped in conceptualization and writing—original draft. LL was involved in writing—review and editing and supervision. YO contributed to term, project administration, formal analysis.

Corresponding author

Correspondence to Lang Li.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethical Approval

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, D., Li, L. & Ou, Y. Side-channel analysis based on Siamese neural network. J Supercomput 80, 4423–4450 (2024). https://doi.org/10.1007/s11227-023-05631-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05631-3

Keywords

Navigation