Creating from noise: trace generations using diffusion model for side-channel attack
In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The generation of synthetic traces can help to improve at- tacks like profiling attacks. However, manually creating synthetic traces from actual traces is ard...
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/173619 https://aihws2024.aisylab.com/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-173619 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1736192024-03-28T15:31:26Z Creating from noise: trace generations using diffusion model for side-channel attack Yap, Trevor Jap, Dirmanto School of Physical and Mathematical Sciences 5th workshop on Artificial Intelligence in Hardware Security (AIHWS 2024) Temasek Laboratories Computer and Information Science Neural network Side-channel attacks In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The generation of synthetic traces can help to improve at- tacks like profiling attacks. However, manually creating synthetic traces from actual traces is arduous. Therefore, automating this process of creating artificial traces is much needed. Recently, diffusion models have gained much recognition after beating another generative model known as Generative Adversarial Networks (GANs) in creating realistic images. We explore the usage of diffusion models in the domain of SCA. We pro- posed frameworks for a known mask setting and unknown mask setting in which the diffusion models could be applied. Under a known mask set- ting, we show that the traces generated under the proposed framework preserved the original leakage. Next, we demonstrated that the artificially created profiling data in the unknown mask setting can reduce the required attack traces for a profiling attack. This suggests that the artificially created profiling data from the trained diffusion model contains useful leakages to be exploited. National Research Foundation (NRF) Submitted/Accepted version This research is supported by the National Research Foundation, Singapore, and Cyber Security Agency of Singapore under its National Cybersecurity Research & Development Programme (Cyber-Hardware Forensic & Assurance Evaluation R&D Programme <NRF2018NCRNCR009-0001>). 2024-03-25T08:03:08Z 2024-03-25T08:03:08Z 2024 Conference Paper Yap, T. & Jap, D. (2024). Creating from noise: trace generations using diffusion model for side-channel attack. 5th workshop on Artificial Intelligence in Hardware Security (AIHWS 2024). https://hdl.handle.net/10356/173619 https://aihws2024.aisylab.com/ en NRF2018NCRNCR009-0001 © 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG. All rights reserved. This article may be downloaded for personal use only. Any other use requires prior permission of the copyright holder. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Computer and Information Science Neural network Side-channel attacks |
spellingShingle |
Computer and Information Science Neural network Side-channel attacks Yap, Trevor Jap, Dirmanto Creating from noise: trace generations using diffusion model for side-channel attack |
description |
In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The generation of synthetic traces can help to improve at- tacks like profiling attacks. However, manually creating synthetic traces from actual traces is arduous. Therefore, automating this process of creating artificial traces is much needed. Recently, diffusion models have gained much recognition after beating another generative model known as Generative Adversarial Networks (GANs) in creating realistic images. We explore the usage of diffusion models in the domain of SCA. We pro- posed frameworks for a known mask setting and unknown mask setting in which the diffusion models could be applied. Under a known mask set- ting, we show that the traces generated under the proposed framework preserved the original leakage. Next, we demonstrated that the artificially created profiling data in the unknown mask setting can reduce the required attack traces for a profiling attack. This suggests that the artificially created profiling data from the trained diffusion model contains useful leakages to be exploited. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Yap, Trevor Jap, Dirmanto |
format |
Conference or Workshop Item |
author |
Yap, Trevor Jap, Dirmanto |
author_sort |
Yap, Trevor |
title |
Creating from noise: trace generations using diffusion model for side-channel attack |
title_short |
Creating from noise: trace generations using diffusion model for side-channel attack |
title_full |
Creating from noise: trace generations using diffusion model for side-channel attack |
title_fullStr |
Creating from noise: trace generations using diffusion model for side-channel attack |
title_full_unstemmed |
Creating from noise: trace generations using diffusion model for side-channel attack |
title_sort |
creating from noise: trace generations using diffusion model for side-channel attack |
publishDate |
2024 |
url |
https://hdl.handle.net/10356/173619 https://aihws2024.aisylab.com/ |
_version_ |
1795302090012098560 |