Export Ready — 

Creating from noise: trace generations using diffusion model for side-channel attack

In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The generation of synthetic traces can help to improve at- tacks like profiling attacks. However, manually creating synthetic traces from actual traces is ard...

全面介紹

Saved in:
書目詳細資料
Main Authors: Yap, Trevor, Jap, Dirmanto
其他作者: School of Physical and Mathematical Sciences
格式: Conference or Workshop Item
語言:English
出版: 2024
主題:
在線閱讀:https://hdl.handle.net/10356/173619
https://aihws2024.aisylab.com/
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The generation of synthetic traces can help to improve at- tacks like profiling attacks. However, manually creating synthetic traces from actual traces is arduous. Therefore, automating this process of creating artificial traces is much needed. Recently, diffusion models have gained much recognition after beating another generative model known as Generative Adversarial Networks (GANs) in creating realistic images. We explore the usage of diffusion models in the domain of SCA. We pro- posed frameworks for a known mask setting and unknown mask setting in which the diffusion models could be applied. Under a known mask set- ting, we show that the traces generated under the proposed framework preserved the original leakage. Next, we demonstrated that the artificially created profiling data in the unknown mask setting can reduce the required attack traces for a profiling attack. This suggests that the artificially created profiling data from the trained diffusion model contains useful leakages to be exploited.