Effective Feature Extraction Method for SVM-Based Profiled Attacks

Authors

  • Ngoc Quy Tran Faculty of Electronics and Telecommunications, Academy of Cryptography Techniques, HaNoi, VietNam
  • Junbeom Hur Department of Computer Science and Engineering, Korea University Seoul 02841, Korea
  • Hieu Minh Nguyen Institute of Cryptographic Science and Technology, HaNoi, VietNam

DOI:

https://doi.org/10.31577/cai_2021_5_1108

Keywords:

Points of interest, profiled attack, side channel attack, support vector machine, variational mode decomposition, Gram-Schmidt orthogonalization

Abstract

Nowadays, one of the most powerful side channel attacks (SCA) is profiled attack. Machine learning algorithms, for example support vector machine, are currently used for improving the effectiveness of the attack. One issue when using SVM-based profiled attack is extracting points of interest, or features from power traces. So far, studies in SCA domain have selected the points of interest (POIs) from the raw power trace for the classifiers. Our work proposes a novel method for finding POIs that based on the combining variational mode decomposition (VMD) and Gram-Schmidt orthogonalization (GSO). That is, VMD is used to decompose the power traces into sub-signals (modes) of different frequencies and POIs selection process based on GSO is conducted on these sub-signals. As a result, the selected POIs are used for SVM classifier to conduct profiled attack. This attack method outperforms other profiled attacks in the same attack scenario. Experiments were performed on a trace data set collected from the Atmega8515 smart card run on the side channel evaluation board Sakura-G/W and the data set of DPA contest v4 to verify the effectiveness of our method in reducing number of power traces for the attacks, especially with noisy power traces.

Downloads

Download data is not yet available.

Downloads

Published

2021-12-31

How to Cite

Tran, N. Q., Hur, J., & Nguyen, H. M. (2021). Effective Feature Extraction Method for SVM-Based Profiled Attacks. COMPUTING AND INFORMATICS, 40(5), 1108–1135. https://doi.org/10.31577/cai_2021_5_1108