Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks

Authors

  • Lennert Wouters imec-COSIC, KU Leuven Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
  • Victor Arribas imec-COSIC, KU Leuven Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
  • Benedikt Gierlichs imec-COSIC, KU Leuven Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium
  • Bart Preneel imec-COSIC, KU Leuven Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

DOI:

https://doi.org/10.13154/tches.v2020.i3.147-168

Keywords:

Side-Channel Analysis, Machine Learning, Deep Learning

Abstract

This work provides a critical review of the paper by Zaid et al. titled “Methodology for Efficient CNN Architectures in Profiling attacks”, which was published in TCHES Volume 2020, Issue 1. This work studies the design of CNN networks to perform side-channel analysis of multiple implementations of the AES for embedded devices. Based on the authors’ code and public data sets, we were able to cross-check their results and perform a thorough analysis. We correct multiple misconceptions by carefully inspecting different elements of the model architectures proposed by Zaid et al. First, by providing a better understanding on the internal workings of these models, we can trivially reduce their number of parameters on average by 52%, while maintaining a similar performance. Second, we demonstrate that the convolutional filter’s size is not strictly related to the amount of misalignment in the traces. Third, we show that increasing the filter size and the number of convolutions actually improves the performance of a network. Our work demonstrates once again that reproducibility and review are important pillars of academic research. Therefore, we provide the reader with an online Python notebook which allows to reproduce some of our experiments1 and additional example code is made available on Github.2

Downloads

Published

2020-06-19

Issue

Section

Articles

How to Cite

Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks. (2020). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020(3), 147-168. https://doi.org/10.13154/tches.v2020.i3.147-168