Stacked ensemble models evaluation on DL based SCA

Anh Tuan Hoang*, Neil Hanley, Ayesha Khalid, Dur-e-Shahwar Kundi, Maire O’Neill

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Side-channel analysis (SCA) has proved its effectiveness in attacking the cryptographic implementations for high security algorithms like Advanced Encryption Standard (AES). The improvement of machine learning (ML) in general and deep learning (DL) in particular in SCA shows that DL is a big threat in hardware security, in which the secret key of SCA countermeasure AES can be revealed with only 40 traces [17]. Combination of multiple DL can improve the effectiveness of SCA more. However, how to combine those models together is still a question. This paper applied stacked ensemble ML to combine the predictions from a number of inputs and sub-models together to enhance the power of DL in attacking AES implementation with SCA countermeasures. We train not only the output probabilities of sub-models but also their maximum likelihood score (MLS) in a stacked ensemble model to improve the performance of convolutional neural network (CNN)-based models. Further more, output probabilities from multiple trace inputs to the same sub-model are also utilized for our stack ensemble model training. A two step training procedure is required, one is for each sub-model and the other is for the stacked ensemble model, which takes inputs as the output probabilities of the above trained sub-models. This paper evaluate the effectiveness of various stacked ensemble models in terms of the number of input traces and the number of sub-models used for the first training stage. Our best model generates state-of-the art results when attacking the ASCAD variable-key database, which has a restricted number of training traces per key, recovering the key within 20 attack traces [15] in comparison to 40 traces as required by the original CNN with Plaintext feature extension (CNNP)-based model.

Original languageEnglish
Title of host publicationE-business and telecommunications: 19th International Conference, ICSBT 2022, and 19th International Conference, SECRYPT 2022, revised selected papers
EditorsMarten Van Sinderen, Fons Wijnhoven, Slimane Hammoudi, Pierangela Samarati, Sabrina De Capitani di Vimercati
PublisherSpringer Cham
Pages43-68
Number of pages26
ISBN (Electronic)9783031451379
ISBN (Print)9783031451362
DOIs
Publication statusPublished - 30 Sept 2023
Event19th International Conference on Security and Cryptography 2022 - Lisbon, Portugal
Duration: 11 Jul 202213 Jul 2022

Publication series

NameCommunications in Computer and Information Science
Volume1849
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference19th International Conference on Security and Cryptography 2022
Abbreviated titleSECRYPT 2022
Country/TerritoryPortugal
CityLisbon
Period11/07/202213/07/2022

Keywords

  • AES
  • CNN
  • CNNP
  • Deep learning
  • Key reveal
  • Masking
  • SCA
  • Stacked ensemble

ASJC Scopus subject areas

  • General Computer Science
  • General Mathematics

Fingerprint

Dive into the research topics of 'Stacked ensemble models evaluation on DL based SCA'. Together they form a unique fingerprint.

Cite this