Deep Learning and Side-Channel Analysis

A Language Model-Inspired framework

Master Thesis (2025)
Author(s)

J.N. Ferreira Henriques De Oliveira Martinho (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

S. Picek – Mentor (TU Delft - Cyber Security)

J. Söhl – Mentor (TU Delft - Statistics)

Faculty
Electrical Engineering, Mathematics and Computer Science
More Info
expand_more
Publication Year
2025
Language
English
Graduation Date
20-10-2025
Awarding Institution
Delft University of Technology
Programme
['Applied Mathematics']
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

As the world becomes increasingly digital, cybersecurity—particularly cryptography—has become a defining concern of this century. Beyond designing robust algorithms, it is vital to evaluate the resilience of devices to adversaries who exploit various aspects of algorithm execution. Side-channel analysis targets physical leakages, such as power consumption and electromagnetic emissions, to extract secret information. State-of-the-art research identifies machine learning attacks using Convolutional Neural Networks (CNNs) and Multi-Layer Perceptrons (MLPs) as the most effective. Language Models have achieved success across diverse domains, some unrelated to language. This thesis investigates their applicability to side-channel analysis and compares their performance with current state-of-the-art methods. Sane or Silly, a language model - inspired framework, is introduced and used to attack the ASCAD datasets. Results demonstrate that this approach can successfully retrieve the key in both ASCADf and ASCADv using only one trace, regardless of whether the secret masks are known during profiling. Desynchronization hindered but did not fully prevent successful attacks. These findings highlight the potential of language models as powerful tools for side-channel analysis.

Files

MSc_thesis_JM_TUD.pdf
(pdf | 2.09 Mb)
License info not available