Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks
DOI:
https://doi.org/10.13154/tches.v2020.i3.147-168Keywords:
Side-Channel Analysis, Machine Learning, Deep LearningAbstract
This work provides a critical review of the paper by Zaid et al. titled “Methodology for Efficient CNN Architectures in Profiling attacks”, which was published in TCHES Volume 2020, Issue 1. This work studies the design of CNN networks to perform side-channel analysis of multiple implementations of the AES for embedded devices. Based on the authors’ code and public data sets, we were able to cross-check their results and perform a thorough analysis. We correct multiple misconceptions by carefully inspecting different elements of the model architectures proposed by Zaid et al. First, by providing a better understanding on the internal workings of these models, we can trivially reduce their number of parameters on average by 52%, while maintaining a similar performance. Second, we demonstrate that the convolutional filter’s size is not strictly related to the amount of misalignment in the traces. Third, we show that increasing the filter size and the number of convolutions actually improves the performance of a network. Our work demonstrates once again that reproducibility and review are important pillars of academic research. Therefore, we provide the reader with an online Python notebook which allows to reproduce some of our experiments1 and additional example code is made available on Github.2
Downloads
Published
Issue
Section
License
Copyright (c) 2020 Lennert Wouters, Victor Arribas, Benedikt Gierlichs, Bart Preneel
This work is licensed under a Creative Commons Attribution 4.0 International License.