machine learning and side-channel analysis · 2019-06-20 · machine learning and side-channel...

38
Machine Learning and Side-channel Analysis Machine Learning and Side-channel Analysis Stjepan Picek, TU Delft, The Netherlands [email protected] Joint works with L. Batina, S. Bhasin, S. Guilley, A. Heuser, D. Jap, J. Kim, F. Regazzoni, etc. SCA Workshop, Sibenik, Croatia, June 18, 2019 1 / 33

Upload: others

Post on 20-May-2020

24 views

Category:

Documents


0 download

TRANSCRIPT

Machine Learning and Side-channel Analysis

Machine Learning and Side-channel Analysis

Stjepan Picek, TU Delft, The [email protected]

Joint works with L. Batina, S. Bhasin, S. Guilley, A. Heuser, D.Jap, J. Kim, F. Regazzoni, etc.

SCA Workshop, Sibenik, Croatia, June 18, 2019

1 / 33

Machine Learning and Side-channel Analysis

Outline

1 Machine Learning

2 Side-channel Attacks

3 Deep Learning and Profiled SCA

4 Problems and “Problems”

5 Conclusions

2 / 33

Machine Learning and Side-channel Analysis

Machine Learning

Definitions

Machine Learning

Machine Learning (ML) is a subfield of computer science thatevolved from the study of pattern recognition and computationallearning theory in artificial intelligence.

Machine Learning

Field of study that gives computers the ability to learn withoutbeing explicitly programmed

Machine Learning Algorithm

A computer program is said to learn from experience E withrespect to some task T and some performance measure P, if itsperformance on T, as measured with P, improves with experienceE.

3 / 33

Machine Learning and Side-channel Analysis

Machine Learning

Machine Learning Types

Supervised learning – available data also include informationhow to correctly classify at least a part of data.

Unsupervised learning – input data does not tell the algorithmwhat the clusters should be.

Semi-supervised learning – information on how to correctlyclassify a small part of data.

Reinforcement learning – take actions based on currentknowledge of the environment and receive feedback in theform of rewards.

4 / 33

Machine Learning and Side-channel Analysis

Machine Learning

Machine Learning Taxonomy

Figure: Taken from trymachinelearning.com

5 / 33

Machine Learning and Side-channel Analysis

Machine Learning

No Free Lunch Theorem

“That even after the observation of the frequent or constantconjunction of objects, we have no reason to draw anyinference concerning any object beyond those of which wehave had experience.” (Hume, 1711-1776).

There exists no single machine learning technique (or model)that works best for every problem.

To find the best (or at least good) model for a certainproblem, numerous algorithms and parameter combinationsshould be tested.

6 / 33

Machine Learning and Side-channel Analysis

Machine Learning

Neural Networks

Stacked neural networks, i.e., networks consisting of multiplelayers.

Layers are made of nodes.

Inputs, neurons, weights, activation functions,...

7 / 33

Machine Learning and Side-channel Analysis

Machine Learning

Multilayer Perceptron

One input layer, one output layer, at least one hidden layer.

8 / 33

Machine Learning and Side-channel Analysis

Machine Learning

Deep Learning

By adding more hidden layers in multilayer perceptron, wearrive to deep learning.

A field existing for a number of years but one that gained alot of attention in the last decade.

Sets of algorithms that attempt to model high-levelabstractions in data by using model architectures withmultiple processing layers, composed of a sequence of scalarproducts and non-linear transformations.

In many tasks, deep learning is actually not necessary sincemachine learning performs well.

9 / 33

Machine Learning and Side-channel Analysis

Machine Learning

Deep Learning

In some tasks deep learning outperforms machine learning aswell as human experts.

Deep learning algorithms scale with data while shallowlearning converges.

Shallow learning refers to machine learning methods thatplateau at a certain level of performance when you add moreexamples and training data to the network.

Often, machine learning works from engineered features whiledeep learning works from raw features.

10 / 33

Machine Learning and Side-channel Analysis

Machine Learning

History of Neural Networks

11 / 33

Machine Learning and Side-channel Analysis

Side-channel Attacks

Implementation Attacks and SCA

Implementation attacks

Implementation attacks do not aim at the weaknesses of thealgorithm, but on its implementation.

Side-channel attacks (SCAs) – passive, non-invasive attacks.

SCAs – one of the most powerful category of attacks oncrypto devices.

Profiled attacks – the most powerful among SCAs.

Within profiling phase the adversary estimates leakage modelsfor targeted intermediate computations, which are exploited toextract secret information in the actual attack phase.

12 / 33

Machine Learning and Side-channel Analysis

Side-channel Attacks

Profiled Attacks

13 / 33

Machine Learning and Side-channel Analysis

Side-channel Attacks

SCA and Machine Learning

Table: Overview of profiling side-channel attacks used in literature (up to March 2019and limited to symmetric key crypto).

Algorithm Reference

Naive Bayes and its variants [1, 2, 3, 4, 5, 6]Random Forest [2, 3, 4, 7, 8, 6, 9, 10, 11, 12, 13, 14]Rotation Forest [15, 4, 5, 16]XGB [5]MultiBoost [15]Self-organizing maps [9]Support Vector Machines [15, 4, 7, 8, 6, 17, 18, 9, 10, 11, 12, 19, 13, 20, 16]Multivariate regression analysis [21, 11, 12]Multilayer Perceptron [2, 3, 5, 7, 8, 6, 22, 23, 24, 25, 26, 27, 28]Convolutional Neural Networks [8, 5, 7, 29, 30, 22, 28]Autoencoders [8]Recurrent Neural Networks [8]Template Attack and its variants [1, 15, 4, 7, 8, 29, 30, 6, 17, 9, 10, 11, 12, 19,

13, 28, 16]Stochastic attack [11, 12, 7]

14 / 33

Machine Learning and Side-channel Analysis

Deep Learning and Profiled SCA

Architectures and Sizes

Figure: Convolutional Neural Network Architectures: from LeNet to ResNet, LanaLazebnik, http://slazebni.cs.illinois.edu/spring17/lec01 cnn architectures.pdf

15 / 33

Machine Learning and Side-channel Analysis

Deep Learning and Profiled SCA

Example of CNN for SCA

8P(y|x)

input

Max Pooling (2)

16 32 256 256

512

64 128 128

DropoutDropout

BN

BN

BNBN

BN

Flatten

16 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Problems and “Problems”

Overfitting and underfitting.

Selection of ML techniques and hyper-parameter tuning.

Portability.

Lack of frameworks/reproducibility.

Lack of datasets.

Explainability.

Still no clear connection between machine learning andside-channel analysis metrics.

Countermeasures.

. . .

17 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Overfitting and Underfitting

Overfitting - if a model is too complex for the problem, then itcan learn the detail and noise in the training data so itnegatively impacts the performance of the model on new data,i.e., an ML model that models the training data too good.

High variance means that the machine learning algorithmlearns to model the noise in the training data and will notgeneralize to new, unseen data.

Underfitting - if a model cannot capture the relationship intraining data or generalize to new data.

High bias means that the machine learning algorithm is notable to capture the relationships in data, and that the modelunderfits.

18 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Bias-Variance Trade-off

19 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Overfitting

Overfitting

To reduce the overfitting, we can add noise.

This can be seen as “blurring” high-frequency patterns thatare more frequently appearing in the data, which willeventually make the model concentrating more on thelow-frequency patterns that are often the more important onesfor a given task.

X ∗ = BN0(X ) + αΨ. (1)

20 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Overfitting

Regularization through Noise to Fight Overfitting

(a) Slide 16 network averaged, RD dataset. (b) ASCAD network averaged, HD dataset.

21 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Portability

Portability

Portability denotes all settings where an attacker has noaccess to traces from the device under attack to conduct atraining but only to traces from a similar or clone device, withuncontrolled variations.

Device1

Labels Tracestrain

Classification Algorithm

Device2

Traces Labelhypothesis

Classification Algorithm

Secret Key

Reality

Expected

Profiled Model

Profiling Phase Attack Phase

Tracestest

22 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Portability

Setup

23 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Portability

Multilayer Perceptron Results

Figure: The guessing entropy metric is the average number of successive guessesrequired with an optimal strategy to determine the true value of a secret key. Here,the optimal strategy is to rank all possible key values from the least likely one to themost likely one.

24 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Portability

Portability Issues

Not all scenarios are equally difficult.

Different device plays more influence but different key alsomakes it a little bit more difficult.

The problem is how we train and validate.

Hyper-parameter tuning and model complexity maybe not socritical anymore?

25 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Portability

Validation and Portability

26 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Portability

Multiple Device Model

Instead of validating on the same device as training, we need(at least) one more device.

Separate devices for train, validation, attack.

Multiple Device Model

All settings where an attacker has no access to traces from thedevice under attack to conduct a training but only to traces from anumber of similar devices (at least 2), with uncontrolled variations.

27 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Portability

Multiple Device Model

28 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Efficient Attacker Framework

Universal Approximation Theorem

Universal Approximation Theorem

Any Borel measurable function f , there exists a feed-forward neuralnetwork, having only a single hidden layer with a finite number ofneurons, which uniformly approximates f within an arbitrarynonzero amount of error ε.

Universal Approximation Theorem for SCA

A profiling side-channel attack where the Universal ApproximationTheorem holds can succeed in breaking an implementation withonly a single measurement.

29 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Efficient Attacker Framework

Efficient Attacker Framework

(a) AES software dataset (b) AES hardware dataset

30 / 33

Machine Learning and Side-channel Analysis

Problems and “Problems”

Efficient Attacker Framework

Efficient Attacker Framework

31 / 33

Machine Learning and Side-channel Analysis

Conclusions

Conclusions

Machine learning plays an important role in SCA and in futureyears it will play even more important role.

We can use a lot of knowledge from other domains but weneed to recognize what and where.

We need to be careful in reusing and reinventing.

Many problems are not real problems but unfortunately, manysolutions are also not real solutions.

The biggest issue is that from the cat-and-mouse game(attack and defense) we went into cat game (only attacks)where new attacks do not help in devising bettercountermeasures.

32 / 33

Machine Learning and Side-channel Analysis

Conclusions

Questions?

Thanks for your attention! Q?

33 / 33

Machine Learning and Side-channel Analysis

Conclusions

Picek, S., Heuser, A., Guilley, S.:

Template attack versus Bayes classifier.Journal of Cryptographic Engineering 7(4) (Nov 2017) 343–351

Heuser, A., Picek, S., Guilley, S., Mentens, N.:

Side-channel analysis of lightweight ciphers: Does lightweight equal easy?In: Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, HongKong, China, November 30 - December 2, 2016, Revised Selected Papers. (2016) 91–104

Heuser, A., Picek, S., Guilley, S., Mentens, N.:

Lightweight ciphers and their side-channel resilience.IEEE Transactions on Computers PP(99) (2017) 1–1

Picek, S., Heuser, A., Jovic, A., Legay, A.:

Climbing down the hierarchy: Hierarchical classification for machine learning side-channel attacks.In Joye, M., Nitaj, A., eds.: Progress in Cryptology - AFRICACRYPT 2017: 9th International Conference onCryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings, Cham, Springer InternationalPublishing (2017) 61–78

Picek, S., Samiotis, I.P., Kim, J., Heuser, A., Bhasin, S., Legay, A.:

On the performance of convolutional neural networks for side-channel analysis.In Chattopadhyay, A., Rebeiro, C., Yarom, Y., eds.: Security, Privacy, and Applied CryptographyEngineering, Cham, Springer International Publishing (2018) 157–176

Picek, S., Heuser, A., Alippi, C., Regazzoni, F.:

When theory meets practice: A framework for robust profiled side-channel analysis.Cryptology ePrint Archive, Report 2018/1123 (2018) https://eprint.iacr.org/2018/1123.

Picek, S., Heuser, A., Jovic, A., Bhasin, S., Regazzoni, F.:

The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations.IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1) (2019) 209–237

33 / 33

Machine Learning and Side-channel Analysis

Conclusions

Maghrebi, H., Portigliatti, T., Prouff, E.:

Breaking cryptographic implementations using deep learning techniques.In: Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016,Hyderabad, India, December 14-18, 2016, Proceedings. (2016) 3–26

Lerman, L., Bontempi, G., Markowitch, O.:

Power analysis attack: An approach based on machine learning.Int. J. Appl. Cryptol. 3(2) (June 2014) 97–115

Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., Standaert, F.:

Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-ChannelAnalysis).In: COSADE 2015, Berlin, Germany, 2015. Revised Selected Papers. (2015) 20–33

Lerman, L., Medeiros, S.F., Bontempi, G., Markowitch, O.:

A Machine Learning Approach Against a Masked AES.In: CARDIS. Lecture Notes in Computer Science, Springer (November 2013) Berlin, Germany.

Lerman, L., Bontempi, G., Markowitch, O.:

A machine learning approach against a masked AES - Reaching the limit of side-channel attacks with alearning model.J. Cryptographic Engineering 5(2) (2015) 123–139

Lerman, L., Bontempi, G., Ben Taieb, S., Markowitch, O.:

A time series approach for profiling attack.In Gierlichs, B., Guilley, S., Mukhopadhyay, D., eds.: Security, Privacy, and Applied CryptographyEngineering, Berlin, Heidelberg, Springer Berlin Heidelberg (2013) 75–94

Najm, Z., Jap, D., Jungk, B., Picek, S., Bhasin, S.:

On comparing side-channel properties of AES and chacha20 on microcontrollers.

33 / 33

Machine Learning and Side-channel Analysis

Conclusions

In: 2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018, Chengdu, China, October26-30, 2018, IEEE (2018) 552–555

Picek, S., Heuser, A., Jovic, A., Ludwig, S.A., Guilley, S., Jakobovic, D., Mentens, N.:

Side-channel analysis and machine learning: A practical perspective.In: 2017 International Joint Conference on Neural Networks, IJCNN 2017, Anchorage, AK, USA, May14-19, 2017. (2017) 4095–4102

Lerman, L., Medeiros, S.F., Veshchikov, N., Meuter, C., Bontempi, G., Markowitch, O.:

Semi-supervised template attack.In Prouff, E., ed.: Constructive Side-Channel Analysis and Secure Design, Berlin, Heidelberg, SpringerBerlin Heidelberg (2013) 184–199

Heuser, A., Zohner, M.:

Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.In Schindler, W., Huss, S.A., eds.: COSADE. Volume 7275 of LNCS., Springer (2012) 249–264

Hospodar, G., Gierlichs, B., De Mulder, E., Verbauwhede, I., Vandewalle, J.:

Machine learning in side-channel analysis: a first study.Journal of Cryptographic Engineering 1 (2011) 293–302 10.1007/s13389-011-0023-x.

Bartkewitz, T., Lemke-Rust, K.:

Efficient template attacks based on probabilistic multi-class support vector machines.In Mangard, S., ed.: Smart Card Research and Advanced Applications, Berlin, Heidelberg, Springer BerlinHeidelberg (2013) 263–276

Hospodar, G., De Mulder, E., Gierlichs, B.:

Least squares support vector machines for side-channel analysis.Center for Advanced Security Research Darmstadt (01 2011) 99–104

Sugawara, T., Homma, N., Aoki, T., Satoh, A.:

33 / 33

Machine Learning and Side-channel Analysis

Conclusions

Profiling attack using multivariate regression analysis.IEICE Electron. Express 7(15) (2010) 1139–1144

Timon, B.:

Non-profiled deep learning-based side-channel attacks.Cryptology ePrint Archive, Report 2018/196 (2018) https://eprint.iacr.org/2018/196.

Pfeifer, C., Haddad, P.:

Spread: a new layer for profiled deep-learning side-channel attacks.Cryptology ePrint Archive, Report 2018/880 (2018) https://eprint.iacr.org/2018/880.

Gilmore, R., Hanley, N., O’Neill, M.:

Neural network based attack on a masked implementation of AES.In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). (May 2015)106–111

Martinasek, Z., Hajny, J., Malina, L.:

Optimization of power analysis using neural network.In Francillon, A., Rohatgi, P., eds.: Smart Card Research and Advanced Applications, Cham, SpringerInternational Publishing (2014) 94–107

Yang, S., Zhou, Y., Liu, J., Chen, D.:

Back propagation neural network based leakage characterization for practical security analysis ofcryptographic implementations.In Kim, H., ed.: Information Security and Cryptology - ICISC 2011, Berlin, Heidelberg, Springer BerlinHeidelberg (2012) 169–185

Martinasek, Z., Zeman, V.:

Innovative method of the power analysis.Radioengineering 22(2) (2013)

Hettwer, B., Gehrer, S., Guneysu, T.:

33 / 33

Machine Learning and Side-channel Analysis

Conclusions

Profiled power analysis attacks using convolutional neural networks with domain knowledge.In Cid, C., Jr., M.J.J., eds.: Selected Areas in Cryptography - SAC 2018 - 25th International Conference,Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers. Volume 11349 of Lecture Notes inComputer Science., Springer (2018) 479–498

Kim, J., Picek, S., Heuser, A., Bhasin, S., Hanjalic, A.:

Make some noise: Unleashing the power of convolutional neural networks for profiled side-channel analysis.Cryptology ePrint Archive, Report 2018/1023 (2018) https://eprint.iacr.org/2018/1023.

Cagli, E., Dumas, C., Prouff, E.:

Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - ProfilingAttacks Without Pre-processing.In: Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei,Taiwan, September 25-28, 2017, Proceedings. (2017) 45–68

33 / 33