Side-channel analysis with graph neural networks

Master Thesis (2021)
Author(s)

V. de Bruijn (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

Elvin Isufi – Mentor (TU Delft - Multimedia Computing)

Stjepan Picek – Mentor (TU Delft - Cyber Security)

R. Taormina – Graduation committee member (TU Delft - Sanitary Engineering)

Faculty
Electrical Engineering, Mathematics and Computer Science
Copyright
© 2021 Vasco de Bruijn
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 Vasco de Bruijn
Graduation Date
29-04-2021
Awarding Institution
Delft University of Technology
Programme
Computer Science | Cyber Security
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

In cyber security, side-channel attacks (SCA) are of interest because they target the vulnerabilities in implementation rather than inherent vulnerabilities in the algorithm. Profiled SCA is especially interesting as it assumes that the adversary has unlimited access to a clone device that can generate sufficient traces to create a profile of the device. The latest techniques used for profiled SCA are based on convolutional neural networks (CNN). However, CNN's are limited in scope in how they define convolution. By running the convolution over a graph instead, we can achieve a more flexible convolution method. Therefore, we want to apply graph neural networks (GNN) to SCA. To achieve this, we need to translate our SCA problem to a graph signal processing (GSP) problem. This is done by generating a graph based on the power traces on which the traces can be run as graph signals. Subsequently, this graph is used in a GNN to solve the GSP problem. We experiment with different GNN architectures to see how they differ in performance compared to SCA state-of-the-art. We also want to observe how our model deals with the different leakage models and if there is a considerable performance gap between them. We also want to see how GNNs deal with countermeasures such as masking and desynchronization. Finally, we perform hyper-parameter analysis to know whether we can reduce the number of learnable parameters without substantially decreasing the performance of our model. The numerical results demonstrate that our model is not competitive compared to state-of-the-art methods. The performance of our method is mainly derived from the classification multilayer perceptron instead of the graph convolutional filter layers. However, the results suggest that the graph convolutional filter layers are potentially helpful in existing SCA architecture as an initial layer that performs feature extraction.

Files

Thesis_Report_Final.pdf
(pdf | 1.75 Mb)
License info not available