Title
End-To-End Automated Cache-Timing Attack Driven By Machine Learning
Abstract
Cache-timing attacks are serious security threats that exploit cache memories to steal secret information. We believe that the identification of a sequence of function calls from cache-timing data measurements is not a trivial step when building an attack. We present a recurrent neural network model able to automatically retrieve a sequence of operations from cache timings. Inspired from natural language processing, our model is able to learn on partially labelled data. We use the model to unfold an end-to-end automated attack on OpenSSL ECDSA on the secp256k1 curve. Our attack is able to extract the 256 bits of the secret key by automatic analysis of about 2400 traces without any human processing.
Year
DOI
Venue
2021
10.1007/s13389-020-00228-5
JOURNAL OF CRYPTOGRAPHIC ENGINEERING
Keywords
DocType
Volume
Side-channel analysis, Cache-timing attacks, Machine learning, Connectionist temporal classification (CTC), Recurrent neural network (RNN)
Journal
11
Issue
ISSN
Citations 
2
2190-8508
1
PageRank 
References 
Authors
0.36
0
5
Name
Order
Citations
PageRank
Thomas Perianin110.36
Sebastien Carre221.72
Victor Dyseryn310.36
Adrien Facon410.36
Sylvain Guilley529233.07