Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/169835
Title: | Peek into the black-box: interpretable neural network using SAT equations in side-channel analysis | Authors: | Yap, Trevor Benamira, Adrien Bhasin, Shivam Peyrin, Thomas |
Keywords: | Engineering::Computer science and engineering | Issue Date: | 2023 | Source: | Yap, T., Benamira, A., Bhasin, S. & Peyrin, T. (2023). Peek into the black-box: interpretable neural network using SAT equations in side-channel analysis. IACR Transactions On Cryptographic Hardware and Embedded Systems, 2023(2), 24-53. https://dx.doi.org/10.46586/tches.v2023.i2.24-53 | Journal: | IACR Transactions on Cryptographic Hardware and Embedded Systems | Abstract: | Deep neural networks (DNN) have become a significant threat to the security of cryptographic implementations with regards to side-channel analysis (SCA), as they automatically combine the leakages without any preprocessing needed, leading to a more efficient attack. However, these DNNs for SCA remain mostly black-box algorithms that are very difficult to interpret. Benamira et al. recently proposed an interpretable neural network called Truth Table Deep Convolutional Neural Network (TT-DCNN), which is both expressive and easier to interpret. In particular, a TT-DCNN has a transparent inner structure that can entirely be transformed into SAT equations after training. In this work, we analyze the SAT equations extracted from a TT-DCNN when applied in SCA context, eventually obtaining the rules and decisions that the neural networks learned when retrieving the secret key from the cryptographic primitive (i.e., exact formula). As a result, we can pinpoint the critical rules that the neural network uses to locate the exact Points of Interest (PoIs). We validate our approach first on simulated traces for higher-order masking. However, applying TT-DCNN on real traces is not straightforward. We propose a method to adapt TT-DCNN for application on real SCA traces containing thousands of sample points. Experimental validation is performed on software-based ASCADv1 and hardware-based AES_HD_ext datasets. In addition, TT-DCNN is shown to be able to learn the exact countermeasure in a best-case setting. | URI: | https://hdl.handle.net/10356/169835 | ISSN: | 2569-2925 | DOI: | 10.46586/tches.v2023.i2.24-53 | Schools: | School of Physical and Mathematical Sciences | Rights: | © 2023 Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin. This work is licensed under a Creative Commons Attribution 4.0 International License. | Fulltext Permission: | open | Fulltext Availability: | With Fulltext |
Appears in Collections: | SPMS Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
TCHES2023_2_02.pdf | 3.36 MB | Adobe PDF | ![]() View/Open |
SCOPUSTM
Citations
50
7
Updated on Mar 12, 2025
Page view(s)
151
Updated on Mar 15, 2025
Download(s) 50
51
Updated on Mar 15, 2025
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.