doi: 10.17586/2226-1494-2019-19-6-1122-1129


SIDE-CHANNEL  INFORMATION LEAK DETECTION WITH WAVELET TRANSFORMATION

D. M. Sleptsova, A. B. Levina


Read the full article  ';
Article in Russian

For citation:
Sleptsova D.M., Levina A.B. Side-channel information leak detection with wavelet transformation. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2019, vol. 19, no. 6, pp. 1122–1129 (in Russian). doi: 10.17586/2226-1494-2019-19-6-1122-1129


Abstract
Subject of study. The paper presents the results of the experimental study of a wavelet-based pre-processing that was used to increase the amount of statistically-discoverable information leakage in a side-channel signal. The studied signal was acquired via an electromagnetic channel of the ARM-Cortex M4F processor. The signal was recorded at the distance of 1 mm and 3 cm. During signal collection, the Advanced Encryption Standard (AES) algorithm was executed on the board. Method. After the acquisition, electromagnetic signal is processed using a discrete wavelet transform with shrinkage of the detail coefficients. The influence of various shrinkage thresholds, mother wavelet, and wavelet decomposition level is studied. After processing of the signal records, the leakage analysis is performed using the Test Vector Leakage Assessment (TVLA), a method based on the Welch statistical test. The obtained estimates are used to compare wavelet transform pre-processing with the leakage estimate of the original signal. Main Results. The signal processed by a wavelet transform shows higher values of the statistical test, that means more confidence in the presence of an information leakage. The universal threshold and zeroing detail coefficients increase the value of the t-criterion by 1.4 times. The third level of decomposition shows the highest result for all wavelet functions. The discrete wavelet of Meyer shows the best result in all experiments. Symlets and Coiflets also show stable results in the experiments. Practical Relevance. Statistical methods, such as the Welch statistical test, can detect leakage without costly and time-consuming stages such as research and attacks. The wavelet transform and processing of the received signal increases the informational components of the signal providing close-to-real statistical signal profiles. Pre-processing based on wavelet transform also allows for leakage detection on fewer signal records.

Keywords: wavelet transformation, side-channel analysis, Welch’s t-test, electromagnetic leakage, thresholding

References
  1. Kocher P. Timing attack on implementation of Diffie-Hellman, RSA, DSS and other systems. Lecture Notes in Computer Science, 1996, vol. 1109, pp. 104–113.
  2. Kocher P., Jaffe J., Jun B. Differential power analysis. Lecture Notes in Computer Science, 1999, pp. 388–397.
  3. Gandolfi K., Mourtel C., Olivier F. Electromagnetic attacks: concrete results. Proc. CHES. Paris, France, 2001, pp. 252–261.
  4. Quisquater J-J., Samyde D. Electromagnetic Analysis (EMA): Measures and countermeasures for smart cards. Lecture Notes in Computer Science, 2001, vol. 2140, pp. 200–210.
  5. Rao J.R., Rohatgi P. EMpowering side-channel attacks. Available at: https://eprint.iacr.org/2001/037.pdf (accessed: 06.08.2019).
  6. Chari A., Rao J.R., Rohatgi P.Тemplate attacks. Lecture Notes in Computer Science, 2002, vol. 2523, pp. 13–28. doi: 10.1007/3-540-36400-5_3
  7. Le T.-H., Clédière J., Servière C., Lacoume J.-L. Noise reduction in side channel attack using fourth-order cumulant. IEEE Transactions on Information Forensics and Security, 2007, vol. 2, no. 4, pp. 710–720. doi: 10.1109/TIFS.2007.910252
  8. Le T.-H., Clédière J., Servière C., Lacoume J.-L. How can signal processing benefit side channel attacks? Proc. Workshop on Signal Processing Applications for Public Security and Forensics. (SAFE'07), 2007, pp. 4218943.
  9. Souissi Y., Danger J.-L., Mekki S., Guilley S., Nassar M. Techniques for electromagnetic attacks enhancement. Proc. 5th International Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS 2010), 2010, pp. 5487590. doi: 10.1109/DTIS.2010.5487590
  10. Souissi Y., Guilley S., Danger J.-L., Mekki S., Duc G. Improvement of power analysis attacks using Kalman filter. Proc. IEEE International Coriference on Acoustics, Speech and Signal Processing (ICASSP 2010), 2010, pp. 1778–1781. doi: 10.1109/ICASSP.2010.5495428
  11. Charvet X., Pelletier H. Improving the DPA attack using Wavelet transform. Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.473.6813&rep=rep1&type=pdf (accessed: 06.08.2019).
  12. Li J., Li S., Shi Y., Zhou E. Wavelet de-noising method in the side-channel attack. Proc. 5thIEEE International Conference on Signal Processing, Communications and Computing (ICSPCC),2015, P. 7338933. doi: 10.1109/ICSPCC.2015.7338933
  13. Ai J., Wang Z., Zhou X., Ou C. Improved wavelet transform for noise reduction in power analysis attacks. Proc. 2016 IEEE International Conference on Signal and Image Processing (ICSIP),2016, pp. 602–606. doi: 10.1109/SIPROCESS.2016.7888333
  14. Park A., Han D.-G., Ryoo J. CPA performance comparison based on Wavelet Transform. Proc. 46th IEEE International Carnahan Conference on Security Technology (ICCST), 2012, pp. 201–206. doi: 10.1109/CCST.2012.6393559
  15. Goodwill G., Jun B., Jaffe J., Rohatgi P. A testing methodology for side­channel resistance validation. Available at: https://csrc.nist.gov/csrc/media/events/non-invasive-attack-testing-workshop/documents/08_goodwill.pdf (accessed: 06.08.2019).
  16. Test Vector Leakage Assessment (TVLA) Derived Test Requirements (DTR) with AES. Available at: https://www.rambus.com/wp-content/uploads/2015/08/TVLA-DTR-with-AES.pdf (accessed: 12.10.2019).
  17.  Silverman B.W. Wavelets in statistics: beyond the standard assumptions. Available at: http://doi.org/10.1098/rsta.1999.0442 (accessed: 22.09.2019).


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика