Improving Cross-Device Attacks using Zero-Mean Unit-Variance Normalization
Document Type
Article
Publication Date
6-2013
Publication Source
Journal of Cryptographic Engineering
Abstract
Template attacks are a very powerful form of side-channel analysis. It is assumed an adversary has access to a training device, identical to the device under attack, to build a precise multivariate characterization of the side-channel emissions. The training and test devices are assumed to have identical, or at least very similar, electromagnetic emissions. Often, when evaluating the effectiveness of a template attack, training and test data are from the same-device. The effectiveness of collecting training and test data from different devices, or cross-device attacks, are evaluated here using 40 PIC microcontroller devices. When the standard template attack methodology fails to produce adequate results, each step is evaluated to identify device-dependent variations. A simple pre-processing technique, normalizing the trace means and variances from the training and test devices, is evaluated for various test data set sizes. This step improves the success key-byte extraction rate for same part number cross-device template attacks from 65.1 to 100 % and improves attacks against similar devices in the same-device family. Additionally, it is demonstrated that due to differences in device leakage, minimizing the number of distinguishing features reduces the effectiveness of cross-device attacks.
Inclusive pages
99-110
ISBN/ISSN
2190-8508
Copyright
Copyright © 2012, Springer
Publisher
Springer
Volume
3
Peer Reviewed
yes
Issue
2
eCommons Citation
Montminy, David P.; Baldwin, Rusty O.; Temple, Michael A.; and Laspe, Eric D., "Improving Cross-Device Attacks using Zero-Mean Unit-Variance Normalization" (2013). Computer Science Faculty Publications. 109.
https://ecommons.udayton.edu/cps_fac_pub/109
COinS
Comments
Permission documentation on file.