Conventional and deep-learning-based side-channel analysis on embedded devices

The security of modern cryptographic devices is increasingly threatened by Side-Channel Attacks (SCA), particularly as traditional profiling attacks face limitations in scalability, adaptability, and noise handling. Manual feature selection, data acquisition, and fine-tuning are labor-intensive, esp...

Full description

Saved in:
Bibliographic Details
Main Author: Gao, Diyan
Other Authors: Gwee Bah Hwee
Format: Thesis-Master by Coursework
Language:English
Published: Nanyang Technological University 2025
Subjects:
AES
Online Access:https://hdl.handle.net/10356/181998
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:The security of modern cryptographic devices is increasingly threatened by Side-Channel Attacks (SCA), particularly as traditional profiling attacks face limitations in scalability, adaptability, and noise handling. Manual feature selection, data acquisition, and fine-tuning are labor-intensive, especially when encountering advanced countermeasures such as masking and operation randomization. To address these challenges, this study integrates the Advanced Encryption Standard (AES-128) in ECB mode on the NXP i.MX RT1050 development board within a FreeRTOS environment, applying a deep learning-based side-channel analysis framework (SCAAML). Compared to conventional methods, this approach leverages deep learning models to automatically extract leakage features from electromagnetic and power consumption data, achieving greater attack accuracy and automation. The robustness of the SCAAML framework was demonstrated through comprehensive testing on various datasets, simulating noise and multitasking conditions. The SCAAML model demonstrated a 75% improvement in key recovery success over traditional Correlation Power Analysis (CPA) methods. Our deep learning approach achieved complete AES key recovery with as few as 400 traces, compared to the 6 key bytes recovered by CPA. The results indicate that deep learning techniques outperform traditional methods in adaptability, efficiently recovering AES keys with minimal traces even under complex multitasking environments. This study offers a more scalable and automated approach to SCA, providing valuable insights for enhancing the security assessment of cryptographic devices in real-world conditions.