Please use this identifier to cite or link to this item:
http://hdl.handle.net/1942/27465
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | ROBYNS, Pieter | - |
dc.contributor.author | QUAX, Peter | - |
dc.contributor.author | LAMOTTE, Wim | - |
dc.date.accessioned | 2018-11-30T15:45:13Z | - |
dc.date.available | 2018-11-30T15:45:13Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019(1), p.1-24 | - |
dc.identifier.issn | 2569-2925 | - |
dc.identifier.uri | http://hdl.handle.net/1942/27465 | - |
dc.description.abstract | Sensitive cryptographic information, e.g. AES secret keys, can be extracted from the electromagnetic (EM) leakages unintentionally emitted by a device using techniques such as Correlation Electromagnetic Analysis (CEMA). In this paper, we introduce Correlation Optimization (CO), a novel approach that improves CEMA attacks by formulating the selection of useful EM leakage samples in a trace as a machine learning optimization problem. To this end, we propose the correlation loss function, which aims to maximize the Pearson correlation between a set of EM traces and the true AES key during training. We show that CO works with high-dimensional and noisy traces, regardless of time-domain trace alignment and without requiring prior knowledge of the power consumption characteristics of the cryptographic hardware. We evaluate our approach using the ASCAD benchmark dataset and a custom dataset of EM leakages from an Arduino Duemilanove, captured with a USRP B200 SDR. Our results indicate that the masked AES implementation used in all three ASCAD datasets can be broken with a shallow Multilayer Perceptron model, whilst requiring only 1,000 test traces on average. A similar methodology was employed to break the unprotected AES implementation from our custom dataset, using 22,000 unaligned and unfiltered test traces. | - |
dc.description.sponsorship | Research Foundation Flanders (FWO),grant number 1S14916N. | - |
dc.language.iso | en | - |
dc.rights | Licensed under Creative Commons License CC-BY 4.0. | - |
dc.subject.other | Correlation Optimization; Software Defined Radio; Correlation Electro-magnetic Analysis; correlation loss; machine learning | - |
dc.title | Improving CEMA using Correlation Optimization | - |
dc.type | Journal Contribution | - |
dc.identifier.epage | 24 | - |
dc.identifier.issue | 1 | - |
dc.identifier.spage | 1 | - |
dc.identifier.volume | 2019 | - |
local.bibliographicCitation.jcat | A1 | - |
local.type.refereed | Refereed | - |
local.type.specified | Article | - |
dc.identifier.doi | 10.13154/tches.v2019.i1.1-24 | - |
item.validation | vabb 2020 | - |
item.contributor | ROBYNS, Pieter | - |
item.contributor | QUAX, Peter | - |
item.contributor | LAMOTTE, Wim | - |
item.fullcitation | ROBYNS, Pieter; QUAX, Peter & LAMOTTE, Wim (2018) Improving CEMA using Correlation Optimization. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019(1), p.1-24. | - |
item.fulltext | With Fulltext | - |
item.accessRights | Open Access | - |
crisitem.journal.issn | 2569-2925 | - |
Appears in Collections: | Research publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
robyns2018improving.pdf | Published version | 2.53 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.