EFFECTIVE FEATURE EXTRACTION METHOD FOR SVM-BASED PROFILED ATTACKS

Ngoc Quy Tran, Junbeom Hur, Hieu Minh Nguyen

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)

    Abstract

    Nowadays, one of the most powerful side channel attacks (SCA) is profiled attack. Machine learning algorithms, for example support vector machine, are currently used for improving the effectiveness of the attack. One issue when using SVM-based profiled attack is extracting points of interest, or features from power traces. So far, studies in SCA domain have selected the points of interest (POIs) from the raw power trace for the classifiers. Our work proposes a novel method for finding POIs that based on the combining variational mode decomposition (VMD) and Gram-Schmidt orthogonalization (GSO). That is, VMD is used to decompose the power traces into sub-signals (modes) of different frequencies and POIs selection process based on GSO is conducted on these sub-signals. As a result, the selected POIs are used for SVM classifier to conduct profiled attack. This attack method outperforms other profiled attacks in the same attack scenario. Experiments were performed on a trace data set collected from the Atmega8515 smart card run on the side channel evaluation board Sakura-G/W and the data set of DPA contest v4 to verify the effectiveness of our method in reducing number of power traces for the attacks, especially with noisy power traces.

    Original languageEnglish
    Pages (from-to)1108-1135
    Number of pages28
    JournalComputing and Informatics
    Volume40
    Issue number5
    DOIs
    Publication statusPublished - 2021 Dec 31

    Bibliographical note

    Publisher Copyright:
    © 2021 Slovak Academy of Sciences. All rights reserved.

    Keywords

    • Gram-Schmidt orthogonalization
    • Points of interest
    • Profiled attack
    • Side channel attack
    • Support vector machine
    • Variational mode decomposition

    ASJC Scopus subject areas

    • Software
    • Hardware and Architecture
    • Computer Networks and Communications
    • Computational Theory and Mathematics

    Fingerprint

    Dive into the research topics of 'EFFECTIVE FEATURE EXTRACTION METHOD FOR SVM-BASED PROFILED ATTACKS'. Together they form a unique fingerprint.

    Cite this