A Systematic Evaluation of Profiling Through Focused Feature Selection

Journal Article (2019)
Author(s)

S. Picek (TU Delft - Cyber Security)

Annelie Heuser (INRIA/IRISA)

Alan Jovic (University of Zagreb)

Lejla Batina (Radboud Universiteit Nijmegen)

Research Group
Cyber Security
Copyright
© 2019 S. Picek, Annelie Heuser, Alan Jovic, Lejla Batina
DOI related publication
https://doi.org/10.1109/TVLSI.2019.2937365
More Info
expand_more
Publication Year
2019
Language
English
Copyright
© 2019 S. Picek, Annelie Heuser, Alan Jovic, Lejla Batina
Research Group
Cyber Security
Issue number
12
Volume number
27
Pages (from-to)
2802-2815
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Profiled side-channel attacks consist of several steps one needs to take. An important, but sometimes ignored, step is a selection of the points of interest (features) within side-channel measurement traces. A large majority of the related works start the analyses with an assumption that the features are preselected. Contrary to this assumption, here, we concentrate on the feature selection step. We investigate how advanced feature selection techniques stemming from the machine learning domain can be used to improve the attack efficiency. To this end, we provide a systematic evaluation of the methods of interest. The experiments are performed on several real-world data sets containing software and hardware implementations of AES, including the random delay countermeasure. Our results show that wrapper and hybrid feature selection methods perform extremely well over a wide range of test scenarios and a number of features selected. We emphasize L1 regularization (wrapper approach) and linear support vector machine (SVM) with recursive feature elimination used after chi-square filter (Hybrid approach) that performs well in both accuracy and guessing entropy. Finally, we show that the use of appropriate feature selection techniques is more important for an attack on the high-noise data sets, including those with countermeasures, than on the low-noise ones.

Files

08836108.1.pdf
(pdf | 2.81 Mb)
License info not available