Machine learning techniques for sidechannel. Annelie Heuser

Podobne dokumenty
Linear Classification and Logistic Regression. Pascal Fua IC-CVLab

Hard-Margin Support Vector Machines

Machine Learning for Data Science (CS4786) Lecture11. Random Projections & Canonical Correlation Analysis

TTIC 31210: Advanced Natural Language Processing. Kevin Gimpel Spring Lecture 9: Inference in Structured Prediction

Previously on CSCI 4622

MoA-Net: Self-supervised Motion Segmentation. Pia Bideau, Rakesh R Menon, Erik Learned-Miller

tum.de/fall2018/ in2357

Few-fermion thermometry

TTIC 31210: Advanced Natural Language Processing. Kevin Gimpel Spring Lecture 8: Structured PredicCon 2

Machine Learning for Data Science (CS4786) Lecture 24. Differential Privacy and Re-useable Holdout

deep learning for NLP (5 lectures)

Machine Learning for Data Science (CS4786) Lecture 11. Spectral Embedding + Clustering

Fig 5 Spectrograms of the original signal (top) extracted shaft-related GAD components (middle) and

Label-Noise Robust Generative Adversarial Networks

ERASMUS + : Trail of extinct and active volcanoes, earthquakes through Europe. SURVEY TO STUDENTS.

Zarządzanie sieciami telekomunikacyjnymi

Łukasz Reszka Wiceprezes Zarządu

New Roads to Cryptopia. Amit Sahai. An NSF Frontier Center

Wykaz linii kolejowych, które są wyposażone w urządzenia systemu ETCS

Wykaz linii kolejowych, które są wyposażone w urzadzenia systemu ETCS

Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition)

Revenue Maximization. Sept. 25, 2018

MaPlan Sp. z O.O. Click here if your download doesn"t start automatically

OPBOX ver USB 2.0 Mini Ultrasonic Box with Integrated Pulser and Receiver

Zakopane, plan miasta: Skala ok. 1: = City map (Polish Edition)

PORTS AS LOGISTICS CENTERS FOR CONSTRUCTION AND OPERATION OF THE OFFSHORE WIND FARMS - CASE OF SASSNITZ

Supervised Hierarchical Clustering with Exponential Linkage. Nishant Yadav

POLITYKA PRYWATNOŚCI / PRIVACY POLICY

Gradient Coding using the Stochastic Block Model

Tychy, plan miasta: Skala 1: (Polish Edition)

Metodyki projektowania i modelowania systemów Cyganek & Kasperek & Rajda 2013 Katedra Elektroniki AGH

Karpacz, plan miasta 1:10 000: Panorama Karkonoszy, mapa szlakow turystycznych (Polish Edition)

Country fact sheet. Noise in Europe overview of policy-related data. Poland

Wprowadzenie do programu RapidMiner, część 2 Michał Bereta 1. Wykorzystanie wykresu ROC do porównania modeli klasyfikatorów

Ankiety Nowe funkcje! Pomoc Twoje konto Wyloguj. BIODIVERSITY OF RIVERS: Survey to students

Installation of EuroCert software for qualified electronic signature

CSC 5930/9010 Modern Cryptography: Perfect Secrecy

Helena Boguta, klasa 8W, rok szkolny 2018/2019

The Lorenz System and Chaos in Nonlinear DEs

System optymalizacji produkcji energii

Neural Networks (The Machine-Learning Kind) BCS 247 March 2019

EXAMPLES OF CABRI GEOMETRE II APPLICATION IN GEOMETRIC SCIENTIFIC RESEARCH

Towards Stability Analysis of Data Transport Mechanisms: a Fluid Model and an Application

USB firmware changing guide. Zmiana oprogramowania za przy użyciu połączenia USB. Changelog / Lista Zmian

Stargard Szczecinski i okolice (Polish Edition)

Instrukcja obsługi User s manual

USB firmware changing guide. Zmiana oprogramowania za przy użyciu połączenia USB. Changelog / Lista Zmian

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Extraclass. Football Men. Season 2009/10 - Autumn round

Rev Źródło:

General Certificate of Education Ordinary Level ADDITIONAL MATHEMATICS 4037/12

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition)

USB firmware changing guide. Zmiana oprogramowania za przy użyciu połączenia USB. Changelog / Lista Zmian

Compatible cameras for NVR-5000 series Main Stream Sub stream Support Firmware ver. 0,2-1Mbit yes yes yes n/d

Maximum A Posteriori Chris Piech CS109, Stanford University

LED PAR 56 7*10W RGBW 4in1 SLIM

y = The Chain Rule Show all work. No calculator unless otherwise stated. If asked to Explain your answer, write in complete sentences.

Auditorium classes. Lectures

ARNOLD. EDUKACJA KULTURYSTY (POLSKA WERSJA JEZYKOWA) BY DOUGLAS KENT HALL

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

DM-ML, DM-FL. Auxiliary Equipment and Accessories. Damper Drives. Dimensions. Descritpion

Miedzy legenda a historia: Szlakiem piastowskim z Poznania do Gniezna (Biblioteka Kroniki Wielkopolski) (Polish Edition)

MATLAB Neural Network Toolbox przegląd

Proposal of thesis topic for mgr in. (MSE) programme in Telecommunications and Computer Science

Compressing the information contained in the different indexes is crucial for performance when implementing an IR system

Sargent Opens Sonairte Farmers' Market

FORMAT. Design: R&S Activa

4. EKSPLOATACJA UKŁADU NAPĘD ZWROTNICOWY ROZJAZD. DEFINICJA SIŁ W UKŁADZIE Siła nastawcza Siła trzymania

How to share data from SQL database table to the OPC Server? Jak udostępnić dane z tabeli bazy SQL do serwera OPC? samouczek ANT.

SubVersion. Piotr Mikulski. SubVersion. P. Mikulski. Co to jest subversion? Zalety SubVersion. Wady SubVersion. Inne różnice SubVersion i CVS

UNIWERSALNY ELEKTRONICZNY PULPIT NASTAWCZY

Rozpoznawanie twarzy metodą PCA Michał Bereta 1. Testowanie statystycznej istotności różnic między jakością klasyfikatorów

Wprowadzenie do programu RapidMiner Studio 7.6, część 9 Modele liniowe Michał Bereta

PROGRAM STAŻU. Nazwa podmiotu oferującego staż / Company name IBM Global Services Delivery Centre Sp z o.o.

Network Services for Spatial Data in European Geo-Portals and their Compliance with ISO and OGC Standards

Analysis of Movie Profitability STAT 469 IN CLASS ANALYSIS #2

Marzec: food, advertising, shopping and services, verb patterns, adjectives and prepositions, complaints - writing

Effective Governance of Education at the Local Level

Strategic planning. Jolanta Żyśko University of Physical Education in Warsaw

Weronika Mysliwiec, klasa 8W, rok szkolny 2018/2019

Rev Źródło:

Surname. Other Names. For Examiner s Use Centre Number. Candidate Number. Candidate Signature

Mirosław Kupczyk Pozna, PCSS, Szkolenie: "Architektura i uytkowanie klastra Linux IA-64"

Krytyczne czynniki sukcesu w zarządzaniu projektami

W trzech niezależnych testach frezy z powłoką X tremeblue typu V803 był w każdym przypadku prawie 2 razy bardziej wydajne niż wersja niepowlekana.

Blow-Up: Photographs in the Time of Tumult; Black and White Photography Festival Zakopane Warszawa 2002 / Powiekszenie: Fotografie w czasach zgielku

OpenPoland.net API Documentation

Inverse problems - Introduction - Probabilistic approach

TTIC 31190: Natural Language Processing

Typ TFP FOR CRITICAL AIR CLEANLINESS AND VERY CRITICAL HYGIENE REQUIREMENTS, SUITABLE FOR CEILING INSTALLATION

ACTIVE. Design: Grzegorz Olech


The Overview of Civilian Applications of Airborne SAR Systems

Urbanek J., Jabłoński A., Barszcz T ssswedfsdfurbanek J., Jabłoński A., Barszcz T., Wykonanie pomiarów

MS OD Integrating MDM and Cloud Services with System Center Configuration Manager

PLSH1 (JUN14PLSH101) General Certificate of Education Advanced Subsidiary Examination June Reading and Writing TOTAL

[ROBOKIDS MANUAL] ROBOROBO

The impact of the global gravity field models on the orbit determination of LAGEOS satellites

Active. Design: Grzegorz Olech

Transkrypt:

Machine learning techniques for sidechannel analysis Annelie Heuser

Outline Side-channel analysis and its terminology Dictionary: Side-channel to Machine learning When can machine learning be helpful? New application: semi-supervised learning

Side-channel analysis cryptography Alice Bob

Side-channel analysis cryptography Alice Bob

Time Sound electromagnetic emanation Side-channel analysis cryptography Alice Bob Side-channel information

Time Sound electromagnetic emanation Side-channel analysis cryptography Alice Bob Side-channel information secret key / sensitive data

<latexit sha1_base64="m1tlk1rdxvlqnsyqch6w9bmgyny=">aaacfhicbzdlsgmxfiyzxmu9vv26crahkpqzexrzdooyor1ap5zmmrahmwrizkjl0idw46u4cagiwxfufbvtarfa+kpgy3/oitl/ealuwhw/nyxfpewv1cxadn1jc2s7t7nbnsrwlfwoekrxa2ky4jjvging9ugzegac1yl+1bhee2daccxvybixzki6knc4jwctvu4e+8agajdcbmowkqs3jbkeyzgnsk8iervcvz8+auxybtfnhefbm0ietvvu5b78tqjxycrqqyxpeg4ezyro4fswudapdysi7zmua1iujgsmmarljfchddq4o7q9endq/p5isgjmmaxsz0igz2zry/o/wiogzkuz4tkkgu Side-channel analysis Measurement setup AES 128 attacking SBox operation in the first round key enumeration feasible

Side-channel analysis Hamming weight model Electromagnetic emanation easily distinguishable regarding HW of intermediate operation Probability 0.12 0.1 0.08 0.06 0.04 0.02 0 0.400 0.350 0.300 0.250 Power Consumption At Time A HW 0 HW 1 HW 2 HW 3 HW 4 HW 5 HW 6 HW 7 HW 8

Side-channel attacks are real in practice Beginning 2016: FBI asks Apple to bypass their encryption Handful methods to break into the encrypted iphone software bugs side-channel attacks glitch attack invasive attacks Documents released by Snowden: NSA is studying the use of side-channel attacks to break into iphones

Side-channel attacks are real in practice attacking Philips Hue smart lamps side-channel attack revealed the global AES-CCM key used to encrypt and verify firmware updates insert malicious update: lamps infect each other with a worm that has the potential to control the device Paper: Eyal Ronen et al, IoT Goes Nuclear: Creating a ZigBee Chain Reaction

Side-channel analysis unprofiled / profiled measurement traces point in time / point of interest intermediate operations / sensitive variable / leakage model distinguisher / attack success rate / guessing entropy

Side-channel analysis unprofiled / profiled measurement traces point in time / point of interest intermediate operations / sensitive variable / leakage model distinguisher / attack success rate / guessing entropy

Side-channel analysis unprofiled / profiled measurement traces point in time / point of interest intermediate operations / sensitive variable / leakage model distinguisher / attack success rate / guessing entropy

Side-channel analysis unprofiled / profiled measurement traces point in time / point of interest intermediate operations / sensitive variable / leakage model distinguisher / attack success rate / guessing entropy

Side-channel analysis to machine learning unprofiled / profiled measurement trace unsupervised / supervised data point in time / point of interest feature intermediate operations / sensitive variable / leakage model label distinguisher / attack classification algorithm success rate / guessing entropy accuracy

Machine learning techniques as side-channel attacks Input: data, labels points of interest from the measurement trace leakage models (intermediate operations) Mainly in supervised scenarios: support vector machines, random forest, Naive Bayes, deep learning

Machine learning techniques as side-channel attacks Input: data, labels points of interest from the measurement trace leakage models (intermediate operations) Mainly in supervised scenarios: support vector machines, random forest, Naive Bayes, deep learning Nature of side-channel leakage is still unknown

Machine learning techniques as side-channel attacks Input: data, labels points of interest from the measurement trace leakage models (intermediate operations) Mainly in supervised scenarios: support vector machines, random forest, Naive Bayes, deep learning Nature of side-channel leakage is still unknown Advantages: suitable in unperfect scenarios more resistant to imprecisions

Machine learning techniques as side-channel attacks Input: data, labels points of interest from the measurement trace leakage models (intermediate operations) Mainly in supervised scenarios: support vector machines, random forest, Naive Bayes, deep learning Nature of side-channel leakage is still unknown Advantages: suitable in unperfect scenarios more resistant to imprecisions Disadvantages: time / computational complexity (additional tuning) community is not yet trusting ( only empirical results )

New perspective Traditional profiled scenario: realistic?

New perspective Semi-supervised learning: a more realistic assessment

Semi-supervised learning Techniques for label prediction: self-training label spreading Classification algorithms: Support vector machines Naive Bayes Template attack (standard + pooled version)

Semi-supervised learning Techniques for label prediction: self-training label spreading Classification algorithms: Support vector machines Naive Bayes Datasets (13 k in total) 100 labeled + 12.9k unlabeled 500 labeled + 12.5k unlabeled 1k labeled + 12k unlabeled 3k labeled + 10k unlabeled 5k labeled + 8k unlabeled 10k labeled + 3k unlabeled Template attack (standard + pooled version)

Semi-supervised learning Techniques for label prediction: self-training label spreading Classification algorithms: Support vector machines Naive Bayes Datasets (13 k in total) 100 labeled + 12.9k unlabeled 500 labeled + 12.5k unlabeled 1k labeled + 12k unlabeled 3k labeled + 10k unlabeled 5k labeled + 8k unlabeled 10k labeled + 3k unlabeled Template attack (standard + pooled version)

<latexit sha1_base64="ulifhbkwc1zgeczihcyner2tpjg=">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 <latexit sha1_base64="btlmprbiabm1cd/t4w12ailntey=">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</latexit> Semi-supervised learning Supervised Semi-supervised

Semi-supervised learning Influence of noise: in high noise scenarios this approach may not be beneficial, optimal signal-to-noise ratio? Number of measurements: in which restricted (practical) scenarios semisupervised learning is beneficial? Number of classes: what is the amount of classes where label predictions can be beneficial? Misclassification of labels: how to limit misclassification of labels? which algorithms cope best with misclassification? Generalisation of models: What are the benefits when considering leakage measurements from different devices and therefore with different leakage distributions?

Questions? annelie.heuser@irisa.fr

Countermeasures

Countermeasures Implementation level countermeasures: masking: adding additional randomness hiding: adding additional noise, decreasing signal-to-noise ratio drawbacks: high implementation overhead, depending on cryptographic primitive

Countermeasures Implementation level countermeasures: masking: adding additional randomness hiding: adding additional noise, decreasing signal-to-noise ratio drawbacks: high implementation overhead, depending on cryptographic primitive Protocol level: Leakage-Resilience modelling attackers with the capability to monitor side-channel information require a side-channel secure initialization in order to obtain a fresh session key for every cryptographic operation drawback: mostly theoretical, not been tested (thoroughly) in practice yet