TY - GEN
T1 - Two Dimensional SOST
T2 - 7th International Conference on Cryptography, Security and Privacy, CSP 2023
AU - Liu, Zheng
AU - Wei, Congming
AU - Wen, Shengjun
AU - Sun, Shaofei
AU - Ding, Yaoling
AU - Wang, An
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, the results of clustering are used to make a leakage metric trace by using sum-of-squared t-values (SOST), based on the leakage metric trace, the points of interest (POI) are selected. Second, they apply k-means on those POIs to get initial labels for the scalar bits, the accuracy of initial labels is only 52%. Third, wrong bits are corrected by using an iterative deep learning framework. Our work focus on improving the horizontal attack framework by replacing SOST with our proposed two dimensional SOST (2D-SOST) to improve the efficiency of POI selection under unsupervised context. 2D-SOST can extract leakage information between dimensions while SOST can only extract information on one dimension which limits its performance. By replacing SOST with 2D-SOST, our method improves the accuracy of clustering algorithm from an average of 58% to an average of 74%. We also simplified the framework used in original paper and finally recover scalar bits successfully under the configuration where the original paper can not.
AB - In 2021, Perin et al. proposed a horizontal attack framework against elliptic curve scalar multiplication (ECSM) operation based on the work of Nascimento et al. Their framework consists roughly of three steps. First, they apply k-means on the iteration traces from multiple ECSM executions, then, the results of clustering are used to make a leakage metric trace by using sum-of-squared t-values (SOST), based on the leakage metric trace, the points of interest (POI) are selected. Second, they apply k-means on those POIs to get initial labels for the scalar bits, the accuracy of initial labels is only 52%. Third, wrong bits are corrected by using an iterative deep learning framework. Our work focus on improving the horizontal attack framework by replacing SOST with our proposed two dimensional SOST (2D-SOST) to improve the efficiency of POI selection under unsupervised context. 2D-SOST can extract leakage information between dimensions while SOST can only extract information on one dimension which limits its performance. By replacing SOST with 2D-SOST, our method improves the accuracy of clustering algorithm from an average of 58% to an average of 74%. We also simplified the framework used in original paper and finally recover scalar bits successfully under the configuration where the original paper can not.
KW - SOST
KW - horizontal attacks
KW - leakage detection
KW - side-channel analysis
UR - http://www.scopus.com/inward/record.url?scp=85173077796&partnerID=8YFLogxK
U2 - 10.1109/CSP58884.2023.00008
DO - 10.1109/CSP58884.2023.00008
M3 - Conference contribution
AN - SCOPUS:85173077796
T3 - Proceedings - 2023 7th International Conference on Cryptography, Security and Privacy, CSP 2023
SP - 1
EP - 6
BT - Proceedings - 2023 7th International Conference on Cryptography, Security and Privacy, CSP 2023
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 21 April 2023 through 23 April 2023
ER -