
Research Article
On Use of Deep Learning for Side Channel Evaluation of Black Box Hardware AES Engine
6 downloads
@INPROCEEDINGS{10.1007/978-3-030-77424-0_15, author={Yoo-Seung Won and Shivam Bhasin}, title={On Use of Deep Learning for Side Channel Evaluation of Black Box Hardware AES Engine}, proceedings={Industrial Networks and Intelligent Systems. 7th EAI International Conference, INISCOM 2021, Hanoi, Vietnam, April 22-23, 2021, Proceedings}, proceedings_a={INISCOM}, year={2021}, month={5}, keywords={Hardware AES engine Side-channel analysis Deep learning}, doi={10.1007/978-3-030-77424-0_15} }
- Yoo-Seung Won
Shivam Bhasin
Year: 2021
On Use of Deep Learning for Side Channel Evaluation of Black Box Hardware AES Engine
INISCOM
Springer
DOI: 10.1007/978-3-030-77424-0_15
Abstract
With the increasing demand for security and privacy, there has been an increasing availability of cryptographic acclerators out of the box in modern microcontrollers, These accelerators are optimised and often black box. Thus, proper evaluation against vulnerabilities like side-channel attacks is a challenge in absence of architecture information and thus leakage model. In this paper, we show the use of deep learning based side-channel attack can overcome this challenge, allowing evaluation of black box AES hardware engine on a secure microcontroller, without the knowledge of precise leakage model information. Our results report full key recovery with only 3,000 traces under a profiling setting.
Copyright © 2021–2025 ICST