Creating from noise: trace generations using diffusion model for side-channel attack

In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The generation of synthetic traces can help to improve at- tacks like profiling attacks. However, manually creating synthetic traces from actual traces is ard...

Full description

Saved in:
Bibliographic Details
Main Authors: Yap, Trevor, Jap, Dirmanto
Other Authors: School of Physical and Mathematical Sciences
Format: Conference or Workshop Item
Language:English
Published: 2024
Subjects:
Online Access:https://hdl.handle.net/10356/173619
https://aihws2024.aisylab.com/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-173619
record_format dspace
spelling sg-ntu-dr.10356-1736192024-03-28T15:31:26Z Creating from noise: trace generations using diffusion model for side-channel attack Yap, Trevor Jap, Dirmanto School of Physical and Mathematical Sciences 5th workshop on Artificial Intelligence in Hardware Security (AIHWS 2024) Temasek Laboratories Computer and Information Science Neural network Side-channel attacks In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The generation of synthetic traces can help to improve at- tacks like profiling attacks. However, manually creating synthetic traces from actual traces is arduous. Therefore, automating this process of creating artificial traces is much needed. Recently, diffusion models have gained much recognition after beating another generative model known as Generative Adversarial Networks (GANs) in creating realistic images. We explore the usage of diffusion models in the domain of SCA. We pro- posed frameworks for a known mask setting and unknown mask setting in which the diffusion models could be applied. Under a known mask set- ting, we show that the traces generated under the proposed framework preserved the original leakage. Next, we demonstrated that the artificially created profiling data in the unknown mask setting can reduce the required attack traces for a profiling attack. This suggests that the artificially created profiling data from the trained diffusion model contains useful leakages to be exploited. National Research Foundation (NRF) Submitted/Accepted version This research is supported by the National Research Foundation, Singapore, and Cyber Security Agency of Singapore under its National Cybersecurity Research & Development Programme (Cyber-Hardware Forensic & Assurance Evaluation R&D Programme <NRF2018NCRNCR009-0001>). 2024-03-25T08:03:08Z 2024-03-25T08:03:08Z 2024 Conference Paper Yap, T. & Jap, D. (2024). Creating from noise: trace generations using diffusion model for side-channel attack. 5th workshop on Artificial Intelligence in Hardware Security (AIHWS 2024). https://hdl.handle.net/10356/173619 https://aihws2024.aisylab.com/ en NRF2018NCRNCR009-0001 © 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG. All rights reserved. This article may be downloaded for personal use only. Any other use requires prior permission of the copyright holder. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Computer and Information Science
Neural network
Side-channel attacks
spellingShingle Computer and Information Science
Neural network
Side-channel attacks
Yap, Trevor
Jap, Dirmanto
Creating from noise: trace generations using diffusion model for side-channel attack
description In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The generation of synthetic traces can help to improve at- tacks like profiling attacks. However, manually creating synthetic traces from actual traces is arduous. Therefore, automating this process of creating artificial traces is much needed. Recently, diffusion models have gained much recognition after beating another generative model known as Generative Adversarial Networks (GANs) in creating realistic images. We explore the usage of diffusion models in the domain of SCA. We pro- posed frameworks for a known mask setting and unknown mask setting in which the diffusion models could be applied. Under a known mask set- ting, we show that the traces generated under the proposed framework preserved the original leakage. Next, we demonstrated that the artificially created profiling data in the unknown mask setting can reduce the required attack traces for a profiling attack. This suggests that the artificially created profiling data from the trained diffusion model contains useful leakages to be exploited.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Yap, Trevor
Jap, Dirmanto
format Conference or Workshop Item
author Yap, Trevor
Jap, Dirmanto
author_sort Yap, Trevor
title Creating from noise: trace generations using diffusion model for side-channel attack
title_short Creating from noise: trace generations using diffusion model for side-channel attack
title_full Creating from noise: trace generations using diffusion model for side-channel attack
title_fullStr Creating from noise: trace generations using diffusion model for side-channel attack
title_full_unstemmed Creating from noise: trace generations using diffusion model for side-channel attack
title_sort creating from noise: trace generations using diffusion model for side-channel attack
publishDate 2024
url https://hdl.handle.net/10356/173619
https://aihws2024.aisylab.com/
_version_ 1795302090012098560