Document Type : Research Article


Shahid Beheshti University Faculty of Computer Science and Engineering Tehran, Iran


Side-channel Analysis (SCA) attacks are effective methods for extracting encryption keys, and with deep learning (DL) techniques, much stronger attacks have been carried out on victim devices. However, carrying out this kind of attack is much more challenging in cross-device attacks when the profiling device and target device are similar but not the same, which can cause the attack to fail. We also reached this conclusion when using only DL-SCA attack on our cross-devise (Atmega microcontroller devices). Due to different processes that lead to significant device-to-device variations, the accuracy of the attack was, on average, only 23%. In this paper, we proposed a method for a real attack on cross-devices using pre-processing methods based on a combination of DL-based Autoencoder and Gaussian low-pass filter (GLPF). According to our analysis results, the accuracy of the attack using only deep learning-based Autoencoder increased to 70% on average, and it improved up to 82% by adding the GLPF technique. The results also showed that combining DL-based autoencoder and GLPF can lead to a successful attack with a maximum of 300 power traces from the victim device.


[1] Debayan Das, Shovan Maity, Saad Bin Nasir, Santosh Ghosh, Arijit Raychowdhury, and Shreyas Sen. High efficiency power side-channel attack immunity using noise injection in attenuated signature domain. In 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 62–67. IEEE, 2017.
[2] Yangdi Lyu and Prabhat Mishra. A survey of side-channel attacks on caches and countermeasures. Journal of Hardware and Systems Security, 2:33–50, 2018.
[3] Honggang Yu, Haoqi Shan, Maximillian Panoff, and Yier Jin. Cross-device profiled side-channel attacks using meta-transfer learning. In 2021 58th ACM/IEEE Design Automation Conference (DAC), pages 703–708. IEEE, 2021.
[4] Suresh Chari, Josyula R Rao, and Pankaj Rohatgi. Template attacks. In Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13–15, 2002 Revised Papers 4, pages 13–28. Springer, 2003.
[5] Marios O Choudary and Markus G Kuhn. Efficient, portable template attacks. IEEE Transactions on Information Forensics and Security, 13(2):490–501, 2017.
[6] Dongxin Guo, Kaiyan Chen, Xiaoyang Hu, Yanhai Wei, and Jianlong Li. A survey of prototype side-channel attacks based on machine learning algorithms for cryptographic chips. In Journal of Physics: Conference Series, volume 1176, page 032005. IOP Publishing, 2019.
[7] Soroor Ghandali, Samaneh Ghandali, and Sara Tehranipoor. Profiled power-analysis attacks by an efficient architectural extension of a cnn implementation. In 2021 22nd International Symposium on Quality Electronic Design (ISQED), pages 395–400. IEEE, 2021.
[8] Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, and Ritu Ranjan. Mind the portability: A warriors guide through realistic profiled side-channel analysis. In NDSS 2020-Network and Distributed
System Security Symposium, pages 1–14, 2020.
[9] Lichao Wu and Stjepan Picek. Remove some noise: On pre-processing of side-channel measurements with autoencoders. IACR Transactions on Cryptographic Hardware and Embedded Systems, pages 389–415, 2020.
[10] Dhruv Thapar, Manaar Alam, and Debdeep Mukhopadhyay. Deep learning assisted cross-
family profiled side-channel attacks using transfer learning. In 2021 22nd International Symposium on Quality Electronic Design (ISQED), pages 178–185. IEEE, 2021.
[11] Fan Zhang, Bin Shao, Guorui Xu, Bolin Yang, Ziqi Yang, Zhan Qin, and Kui Ren. From homogeneous to heterogeneous: Leveraging deep learning based power analysis across devices. In 2020 57th ACM/IEEE Design Automation Conference (DAC), pages 1–6. IEEE, 2020.
[12] Pei Cao, Chi Zhang, Xiangjun Lu, and Dawu Gu. Cross-device profiled side-channel attack with unsupervised domain adaptation. IACR Transactions on Cryptographic Hardware and Embedded Systems, pages 27–56, 2021.
[13] Pei Cao, Hongyi Zhang, Dawu Gu, Yan Lu, and Yidong Yuan. Al-pa: Cross-device profiled sidechannel attack using adversarial learning. In Proceedings of the 59th ACM/IEEE Design Automation Conference, pages 691–696, 2022.
[14] Josef Danial, Debayan Das, Anupam Golder, Santosh Ghosh, Arijit Raychowdhury, and Shreyas Sen. Em-x-dl: Efficient cross-device deep learning side-channel attack with noisy em signatures. ACM Journal on Emerging Technologies in Computing Systems (JETC), 18(1):1–17, 2021.
[15] Honggang Yu, Mei Wang, Xiyu Song, Haoqi Shan, Hongbing Qiu, Junyi Wang, and Kaichen Yang. Noise2clean: Cross-device side-channel traces denoising with unsupervised deep learning. Electronics, 12(4):1054, 2023.
[16] Anupam Golder, Debayan Das, Josef Danial, Santosh Ghosh, Shreyas Sen, and Arijit Raychowdhury. Practical approaches toward deeplearning-based cross-device power side-channel attack. IEEE Transactions on Very Large Scale
Integration (VLSI) Systems, 27(12):2720–2733, 2019.
[17] Debayan Das, Anupam Golder, Josef Danial, Santosh Ghosh, Arijit Raychowdhury, and Shreyas Sen. X-deepsca: Cross-device deep learning side channel attack. In Proceedings of the 56th Annual Design Automation Conference 2019, pages 1–6, 2019.
[18] Farshideh Kordi, Hamed Hosseintalaee, and Ali Jahanian. A time randomization-based countermeasure against the template side-channel attack. ISeCure, 14(1), 2022.
[19] Mart´ın Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. {TensorFlow}: a system for {Large-Scale} machine learning. In 12th
USENIX symposium on operating systems design and implementation (OSDI 16), pages 265–283, 2016.
[20] Owen Lo, William J Buchanan, and Douglas Carson. Power analysis attacks on the aes-128 s-box using differential power analysis (dpa) and correlation power analysis (cpa). Journal of Cyber Security Technology, 1(2):88–107, 2017.
[21] Farshideh Kordi, Hamed Hosseintalaee, and Ali Jahanian. Cost-effective and practical counter-measure against the template side channel attack. In 2020 17th International ISC Conference on Information Security and Cryptology (ISCISC),
pages 22–27. IEEE, 2020.
[22] Stjepan Picek, Annelie Heuser, Alan Jovic, Simone A Ludwig, Sylvain Guilley, Domagoj Jakobovic, and Nele Mentens. Side-channel analysis and machine learning: A practical perspective. In 2017 International Joint Conference on Neural Networks (IJCNN), pages 4095–4102. IEEE, 2017.
[23] Eleonora Cagli, C´ecile Dumas, and Emmanuel Prouff. Convolutional neural networks with data augmentation against jitter-based countermeasures. In Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Confer-
ence, 2017.
[24] MathWorks.\images/ref/fspecial.html. Math-WorksR2023a.