A Novel Attention-Based LSTM Model for Non-Profiled Side-Channel Attacks

Kangran Pu, Hua Dang, Wei Gao, Fancong Kong, Weijiang Wang*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Non-profiled side-channel attacks represent a powerful class of attacks for no excessive information from the target device is required. Recently, the application of deep learning techniques on non-profiled side-channel attacks has yielded promising results. However, some existing studies have not fully exploited the properties of power traces as a time series. In this paper, an attention-based Long Short-Term Memory (LSTM) model for non-profiled attacks is proposed. This novel architecture combines LSTM and an attention mechanism in order to precisely extract the features of time samples in long-term traces. Through experiments on a public dataset, this architecture outperforms previous methods by producing more distinguishable results in identifying the correct key. Moreover, this architecture demonstrates reliable results in attacking power traces with additional Gaussian noise.

Original languageEnglish
Title of host publication2023 8th International Conference on Signal and Image Processing, ICSIP 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1050-1054
Number of pages5
ISBN (Electronic)9798350397932
DOIs
Publication statusPublished - 2023
Event8th International Conference on Signal and Image Processing, ICSIP 2023 - Wuxi, China
Duration: 8 Jul 202310 Jul 2023

Publication series

Name2023 8th International Conference on Signal and Image Processing, ICSIP 2023

Conference

Conference8th International Conference on Signal and Image Processing, ICSIP 2023
Country/TerritoryChina
CityWuxi
Period8/07/2310/07/23

Keywords

  • LSTM
  • attention mechanism
  • deep learning
  • non-profiled attacks

Fingerprint

Dive into the research topics of 'A Novel Attention-Based LSTM Model for Non-Profiled Side-Channel Attacks'. Together they form a unique fingerprint.

Cite this