CL-SCA: A Contrastive Learning Approach for Profiled Side-Channel Analysis

IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS
Annyu Liu;An Wang;Shaofei Sun;Congming Wei;Yaoling Ding;Yongjuan Wang;Liehuang Zhu
{"title":"CL-SCA: A Contrastive Learning Approach for Profiled Side-Channel Analysis","authors":"Annyu Liu;An Wang;Shaofei Sun;Congming Wei;Yaoling Ding;Yongjuan Wang;Liehuang Zhu","doi":"10.1109/TIFS.2025.3570123","DOIUrl":null,"url":null,"abstract":"Side-channel analysis (SCA) based on machine learning, particularly neural networks, has gained considerable attention in recent years. However, previous works predominantly focus on establishing connections between labels and related profiled traces. These approaches primarily capture label-related features and often overlook the connections between traces of the same label, resulting in the loss of some valuable information. Besides, the attack traces also contain valuable information that can be used in the training process to assist model learning. In this paper, we propose a profiled SCA approach based on contrastive learning named CL-SCA to address these issues. This approach extracts features by emphasizing the similarities among traces, thereby improving the effectiveness of key recovery while maintaining the advantages of the original SCA approach. Through experiments of different datasets from different platforms, we demonstrate that CL-SCA significantly outperforms other approaches. Moreover, by incorporating attack traces into the training process using our approach, we can further enhance its performance. This extension can improve the effectiveness of key recovery, which is fully verified through experiments on different datasets.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"5109-5122"},"PeriodicalIF":8.0000,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11004036/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

Side-channel analysis (SCA) based on machine learning, particularly neural networks, has gained considerable attention in recent years. However, previous works predominantly focus on establishing connections between labels and related profiled traces. These approaches primarily capture label-related features and often overlook the connections between traces of the same label, resulting in the loss of some valuable information. Besides, the attack traces also contain valuable information that can be used in the training process to assist model learning. In this paper, we propose a profiled SCA approach based on contrastive learning named CL-SCA to address these issues. This approach extracts features by emphasizing the similarities among traces, thereby improving the effectiveness of key recovery while maintaining the advantages of the original SCA approach. Through experiments of different datasets from different platforms, we demonstrate that CL-SCA significantly outperforms other approaches. Moreover, by incorporating attack traces into the training process using our approach, we can further enhance its performance. This extension can improve the effectiveness of key recovery, which is fully verified through experiments on different datasets.
CL-SCA:侧面通道分析的对比学习方法
近年来,基于机器学习,特别是神经网络的侧信道分析(SCA)得到了相当大的关注。然而,以前的工作主要集中在建立标签和相关的轮廓线之间的联系。这些方法主要捕获与标签相关的特征,并且经常忽略同一标签的轨迹之间的联系,从而导致丢失一些有价值的信息。此外,攻击痕迹还包含有价值的信息,可以在训练过程中用于辅助模型学习。在本文中,我们提出了一种基于对比学习的概要SCA方法,称为CL-SCA来解决这些问题。这种方法通过强调跟踪之间的相似性来提取特征,从而提高了密钥恢复的有效性,同时保持了原始SCA方法的优点。通过对来自不同平台的不同数据集的实验,我们证明了CL-SCA显著优于其他方法。此外,通过使用我们的方法将攻击痕迹合并到训练过程中,我们可以进一步提高其性能。这个扩展可以提高密钥恢复的有效性,这是通过不同数据集的实验充分验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信