convolutional neural networks with data augmentation
play

Convolutional Neural Networks with Data Augmentation against - PowerPoint PPT Presentation

Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Eleonora Cagli 1 , 3 ecile Dumas 1 C Emmanuel Prouff 2 , 3 1


  1. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Eleonora Cagli 1 , 3 ecile Dumas 1 C´ Emmanuel Prouff 2 , 3 1 Univ. Grenoble Alpes, F-38000, Grenoble, France CEA, LETI, MINATEC Campus, F-38054 Grenoble, France { eleonora.cagli,cecile.dumas } @cea.fr 2 Safran Identity and Security, France emmanuel.prouff@safrangroup.com 3 Sorbonne Universit´ es, UPMC Univ. Paris 06, CNRS, INRIA, Laboratoire d’Informatique de Paris 6 (LIP6), ´ Equipe PolSys, 4 place Jussieu, 75252 Paris Cedex 05, France 26/09/2017, CHES 2017, Taipei, Taiwan 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 1/26

  2. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures About the authors Who we are Conceives a Evaluates Delivers a Security Commercialises the component Security Claims Certification certified product Developer ITSEF ANSSI Developer French Certification Scheme 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 2/26

  3. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures About the authors Who we are Conceives a Evaluates Delivers a Security Commercialises the component Security Claims Certification certified product Developer ITSEF ANSSI Developer French Certification Scheme Cécile 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 2/26

  4. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures About the authors Who we are Conceives a Evaluates Delivers a Security Commercialises the component Security Claims Certification certified product Developer ITSEF ANSSI Developer French Certification Scheme Cécile Eleonora 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 2/26

  5. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures About the authors Who we are Conceives a Evaluates Delivers a Security Commercialises the component Security Claims Certification certified product Developer ITSEF ANSSI Developer Emmanuel (in the past) French Certification Scheme Cécile Eleonora 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 2/26

  6. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures About the authors Who we are Conceives a Evaluates Delivers a Security Commercialises the component Security Claims Certification certified product Developer ITSEF ANSSI Developer French Certification Scheme Cécile Emmanuel (today) Eleonora 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 2/26

  7. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures About the authors Who we are Conceives a Evaluates Delivers a Security Commercialises the component Security Claims Certification certified product Developer ITSEF ANSSI Developer French Certification Scheme Cécile Emmanuel (today) Eleonora An evaluation point of view ◮ profiling attacks (worst-case security) ◮ practical aspects are concerned 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 2/26

  8. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Contents 1. Context and Motivation 2. A machine learning approach to classification 2.1 Introduction 2.2 Convolutional Neural Networks 3. Data Augmentation 4. Experimental Results 5. Conclusions 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 3/26

  9. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Side Channel Attacks Notations ◮ X side channel trace ◮ Z target (a cryptographic sensitive variable Z = f ( P , K )) Goal: make inference over Z , observing X 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 4/26

  10. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Side Channel Attacks Notations ◮ X side channel trace ◮ Z target (a cryptographic sensitive variable Z = f ( P , K )) Goal: make inference over Z , observing X Pr [ Z | X ] 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 4/26

  11. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Side Channel Attacks Notations ◮ X side channel trace ◮ Z target (a cryptographic sensitive variable Z = f ( P , K )) Goal: make inference over Z , observing X Pr [ Z | X ] Template Attacks ◮ Profiling phase (using profiling traces under known Z ) ◮ Attack phase ( N attack traces, e.g. with known plaintexts p i ) Log-likelihood score for each key hypothesis k N � d k = log Pr [ X = x i | Z = f ( p i , k )] i =1 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 4/26

  12. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Side Channel Attacks Notations ◮ X side channel trace ◮ Z target (a cryptographic sensitive variable Z = f ( P , K )) Goal: make inference over Z , observing X Pr [ Z | X ] Template Attacks ◮ Profiling phase (using profiling traces under known Z ) ◮ estimate Pr [ X | Z = z ] for each value of z ◮ Attack phase ( N attack traces, e.g. with known plaintexts p i ) Log-likelihood score for each key hypothesis k N � d k = log Pr [ X = x i | Z = f ( p i , k )] i =1 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 4/26

  13. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Side Channel Attacks Notations ◮ X side channel trace ◮ Z target (a cryptographic sensitive variable Z = f ( P , K )) Goal: make inference over Z , observing X Pr [ Z | X ] Template Attacks ◮ Profiling phase (using profiling traces under known Z ) ◮ estimate Pr [ X | Z = z ] for each value of z ◮ Attack phase ( N attack traces, e.g. with known plaintexts p i ) ◮ Log-likelihood score for each key hypothesis k N � d k = log Pr [ X = x i | Z = f ( p i , k )] i =1 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 4/26

  14. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Side Channel Attacks Notations ◮ X side channel trace ◮ Z target (a cryptographic sensitive variable Z = f ( P , K )) Goal: make inference over Z , observing X Pr [ Z | X ] Template Attacks ◮ Profiling phase (using profiling traces under known Z ) ◮ mandatory dimensionality reduction ◮ estimate Pr [ X | Z = z ] for each value of z ◮ Attack phase ( N attack traces, e.g. with known plaintexts p i ) ◮ Log-likelihood score for each key hypothesis k N � d k = log Pr [ X = x i | Z = f ( p i , k )] i =1 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 4/26

  15. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Side Channel Attacks Notations ◮ X side channel trace ◮ Z target (a cryptographic sensitive variable Z = f ( P , K )) Goal: make inference over Z , observing X Pr [ Z | X ] Template Attacks ◮ Profiling phase (using profiling traces under known Z ) ◮ manage de-synchronization problem ◮ mandatory dimensionality reduction ◮ estimate Pr [ X | Z = z ] for each value of z ◮ Attack phase ( N attack traces, e.g. with known plaintexts p i ) ◮ Log-likelihood score for each key hypothesis k N � d k = log Pr [ X = x i | Z = f ( p i , k )] i =1 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 4/26

  16. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Misalignment Misaligning Countermeasures ◮ Random Delays, Clock Jittering, ... ◮ In theory: insufficient to provide security, since information still leak (somewhere) ◮ In practice: one of the main issues for evaluators 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 5/26

  17. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Misalignment Misaligning Countermeasures ◮ Random Delays, Clock Jittering, ... ◮ In theory: insufficient to provide security, since information still leak (somewhere) ◮ In practice: one of the main issues for evaluators Realignment Mandatory realignment preprocessing ◮ not a wide literature ◮ in practice: evaluation labs home-made realignment techniques 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 5/26

  18. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Risks of realignment An example 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 6/26

  19. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Risks of realignment An example 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 6/26

  20. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Risks of realignment An example 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 6/26

  21. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Risks of realignment An example 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 6/26

  22. Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures Risks of realignment An example 26/09/2017, CHES 2017, Taipei, Taiwan | E. Cagli, C. Dumas, E. Prouff | 6/26

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend