Hound: Locating Cryptographic Primitives in Desynchronized Side-Channel Traces Using Deep-Learning

Davide Galli,Giuseppe Chiari,Davide Zoni
2024-09-16
Abstract:Side-channel attacks allow to extract sensitive information from cryptographic primitives by correlating the partially known computed data and the measured side-channel signal. Starting from the raw side-channel trace, the preprocessing of the side-channel trace to pinpoint the time at which each cryptographic primitive is executed, and, then, to re-align all the collected data to this specific time represent a critical step to setup a successful side-channel attack. The use of hiding techniques has been widely adopted as a low-cost solution to hinder the preprocessing of side-channel traces thus limiting side-channel attacks in real scenarios. This work introduces Hound, a novel deep learning-based pipeline to locate the execution of cryptographic primitives within the side-channel trace even in the presence of trace deformations introduced by the use of dynamic frequency scaling actuators. Hound has been validated through successful attacks on various cryptographic primitives executed on an FPGA-based system-on-chip incorporating a RISC-V CPU, while dynamic frequency scaling is active. Experimental results demonstrate the possibility of identifying the cryptographic primitives in DFS-deformed side-channel traces.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is: in the presence of hidden techniques such as Dynamic Frequency Scaling (DFS), how to accurately locate the execution positions of cryptographic primitives (CPs) in side - channel traces. Specifically, the paper proposes a deep - learning - based method - Hound, which is used to automatically locate and align the execution times of cryptographic primitives in highly randomized side - channel traces, thereby overcoming the challenges faced by traditional methods in practical scenarios. ### Problem Background Side - channel attacks can extract sensitive information by analyzing the physical signals (such as power consumption or electromagnetic emissions) generated by devices when executing cryptographic algorithms. In order to conduct a successful side - channel attack, an attacker needs to be able to accurately locate and align the execution time of each cryptographic primitive. However, devices in the real world usually use hidden techniques (such as DFS) to disrupt side - channel traces, making this task very difficult. ### Main Contributions of the Paper 1. **Automated Location and Alignment**: Hound proposes a deep - learning pipeline that can automatically locate and align cryptographic primitives in side - channel power traces in the presence of DFS countermeasures. This eliminates the need for triggering infrastructure, which is a significant obstacle in real - world side - channel analysis. 2. **Effectiveness Verification**: The paper evaluates the effectiveness of this method on different cryptographic primitives and verifies the quality of the results by successfully implementing side - channel attacks. In addition, it is also compared with the existing state - of - the - art methods. 3. **Open - Source Tools and Datasets**: To promote further research and ensure reproducibility, the authors release Hound as an open - source tool and provide a related side - channel trace dataset. ### Method Overview The method of Hound includes two main stages: - **Training Pipeline**: - **Dataset Building**: Create a dataset from noise and cryptographic traces, labeled as "CP start", "CP remaining part", and "noise". - **CNN Training**: Train a model using a convolutional neural network (CNN) classifier to distinguish the above three categories. - **Inference Pipeline**: - **Sliding Window Classification**: Divide the new side - channel trace into windows and classify them using the trained CNN. - **Screening**: Refine the classification results through a multi - step iterative process (POLISH, EXTRACT, REFINE) to determine the starting point of each CP. - **Alignment**: Segment - align the input side - channel trace according to the determined CP starting points. ### Experimental Results The experimental results show that Hound performs excellently in handling highly distorted side - channel traces caused by DFS. Especially for cryptographic algorithms such as AES, Clefia, and Camellia, Hound can accurately identify the starting positions of CPs, and its performance is better than existing methods. ### Conclusion By introducing Hound, the paper solves the problem of locating cryptographic primitives in side - channel traces in the presence of hidden techniques such as DFS. This result not only improves the effectiveness of side - channel attacks but also provides an important reference and tool for future related research.