{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T07:32:48Z","timestamp":1725003168786},"reference-count":22,"publisher":"Institution of Engineering and Technology (IET)","issue":"3","license":[{"start":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T00:00:00Z","timestamp":1671494400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100007224","name":"National Foundation for Science and Technology Development","doi-asserted-by":"publisher","award":["102.02\u20102020.14"],"id":[{"id":"10.13039\/100007224","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2023,5]]},"abstract":"Abstract<\/jats:title>In modern embedded systems, security issues including side\u2010channel attacks (SCAs) are becoming of paramount importance since the embedded devices are ubiquitous in many categories of consumer electronics. Recently, deep learning (DL) has been introduced as a new promising approach for profiled and non\u2010profiled SCAs. This paper proposes and evaluates the applications of different DL techniques including the Convolutional Neural Network and the multilayer perceptron models for non\u2010profiled attacks on the AES\u2010128 encryption implementation. Especially, the proposed network is fine\u2010tuned with different number of hidden layers, labelling techniques and activation functions. Along with the designed models, a dataset reconstruction and labelling technique for the proposed model has also been performed for solving the high dimension data and imbalanced dataset problem. As a result, the DL based SCA with our reconstructed dataset for different targets of ASCAD, RISC\u2010V microcontroller, and ChipWhisperer boards has achieved a higher performance of non\u2010profiled attacks. Specifically, necessary investigations to evaluate the efficiency of the proposed techniques against different SCA countermeasures, such as masking and hiding, have been performed. In addition, the effect of the activation function on the proposed DL models was investigated. The experimental results have clarified that the exponential linear unit function is better than the rectified linear unit in fighting against noise generation\u2010based hiding countermeasure.<\/jats:p>","DOI":"10.1049\/ise2.12102","type":"journal-article","created":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T05:05:50Z","timestamp":1671599150000},"page":"377-393","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["On the performance of non\u2010profiled side channel attacks based on deep learning techniques"],"prefix":"10.1049","volume":"17","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9195-658X","authenticated-orcid":false,"given":"Ngoc\u2010Tuan","family":"Do","sequence":"first","affiliation":[{"name":"Institute of System Integration Le Quy Don Technical University Hanoi Vietnam"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0944-8701","authenticated-orcid":false,"given":"Van\u2010Phuc","family":"Hoang","sequence":"additional","affiliation":[{"name":"Institute of System Integration Le Quy Don Technical University Hanoi Vietnam"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9048-4341","authenticated-orcid":false,"given":"Van Sang","family":"Doan","sequence":"additional","affiliation":[{"name":"Vietnam Naval Academy Nha Trang Vietnam"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5255-4919","authenticated-orcid":false,"given":"Cong\u2010Kha","family":"Pham","sequence":"additional","affiliation":[{"name":"The University of Electro\u2010Communications (UEC) Tokyo Japan"}]}],"member":"265","published-online":{"date-parts":[[2022,12,20]]},"reference":[{"key":"e_1_2_12_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2020.2981636"},{"key":"e_1_2_12_3_1","doi-asserted-by":"crossref","unstructured":"Le T.H. Canovas C. Cl\u00e9di\u00e8re J.:An overview of side channel analysis attacks pp.33\u201343. (2008)","DOI":"10.1145\/1368310.1368319"},{"key":"e_1_2_12_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_16"},{"key":"e_1_2_12_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_3"},{"key":"e_1_2_12_6_1","first-page":"9","volume-title":"Foundations of Side\u2010Channel Attacks","author":"Ouladj M.","year":"2021"},{"key":"e_1_2_12_7_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i2.107\u2010131"},{"key":"e_1_2_12_8_1","doi-asserted-by":"crossref","unstructured":"Do N.T. Hoang V.P. Doan V.S.:Performance analysis of non\u2010profiled side channel attacks based on convolutional neural networks. In:2020 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS) pp.\u00a066\u201369. (2020)","DOI":"10.1109\/APCCAS50809.2020.9301673"},{"key":"e_1_2_12_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05072-6_10"},{"key":"e_1_2_12_10_1","first-page":"1094","volume-title":"Principal Component Analysis","author":"Jolliffe I.","year":"2011"},{"key":"e_1_2_12_11_1","doi-asserted-by":"crossref","unstructured":"Alipour A. et\u00a0al.:On the performance of non\u2010profiled differential deep learning attacks against an aes encryption algorithm protected using a correlated noise generation based hiding countermeasure. In:2020 Design Automation Test in Europe Conference Exhibition (DATE) pp.\u00a0614\u2013617. (2020)","DOI":"10.23919\/DATE48585.2020.9116387"},{"key":"e_1_2_12_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474376.3487285"},{"key":"e_1_2_12_13_1","article-title":"The curse of class imbalance and conflicting metrics with machine learning for side\u2010channel evaluations","volume":"2019","author":"Picek S.","year":"2018","journal-title":"Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"e_1_2_12_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"e_1_2_12_15_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.148\u2010179"},{"key":"e_1_2_12_16_1","first-page":"578","article-title":"Deep learning based side channel attacks in practice","volume":"2019","author":"Maghrebi H.","year":"2019","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_2_12_17_1","first-page":"53","article-title":"Study of deep learning techniques for side\u2010channel analysis and introduction to ascad database","volume":"2018","author":"Prouff E.","year":"2018","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_2_12_18_1","volume-title":"Power Analysis Attacks \u2010 Revealing the Secrets of Smart Cards","author":"Mangard S.","year":"2007"},{"key":"e_1_2_12_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3031836.3031842"},{"key":"e_1_2_12_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63083-6_22"},{"key":"e_1_2_12_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389\u2010014\u20100089\u20103"},{"key":"e_1_2_12_22_1","doi-asserted-by":"crossref","unstructured":"Gilmore R. Hanley N. O\u2019Neill M.:Neural network based attack on a\u00a0masked implementation of aes. In:2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) pp.106\u2013111. (2015)","DOI":"10.1109\/HST.2015.7140247"},{"key":"e_1_2_12_23_1","doi-asserted-by":"crossref","unstructured":"Kamoun N. Bossuet L. Ghazel A.:Correlated power noise generator as a low cost dpa countermeasures to secure hardware aes cipher. In:2009 3rd International Conference on Signals Circuits and Systems (SCS) pp.1\u20136. (2009)","DOI":"10.1109\/ICSCS.2009.5412604"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ise2.12102","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/ise2.12102","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ise2.12102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,20]],"date-time":"2023-08-20T19:58:23Z","timestamp":1692561503000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/ise2.12102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,20]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["10.1049\/ise2.12102"],"URL":"https:\/\/doi.org\/10.1049\/ise2.12102","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"value":"1751-8709","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,20]]},"assertion":[{"value":"2022-01-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-22","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-12-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}