Machine Learning based Side Channel Selection for Time-Driven Cache Attacks on AES

Burcu Sonmez, Ahmet Ali Sarikaya, Serif Bahtiyar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

Side-channel attacks use indirect information about cryptographic operations from the targeted system. This makes the attacks highly effective on the system. In this paper, we explore the time-based cache attack that uses the time feature and cache information as secondary channel information. We selected AES algorithm to accomplish the time-based side channel attack. This time-based side channel attack targets the secret key in the last cycle of AES algorithm. We use machine learning models to extract information from secondary channels to determine vulnerabilities of the system. We use tree models on the time profiles created during the attack then we evaluated the most significant characteristics of the attack. Since Decision Tree, Random Forest, Gradient Boosting Model, and Extreme Gradient Boosting algorithms are very sensitive to processing tasks, we selected them as tree algorithms. Analysis results show that 'cycle on average' information helps to predict the time-driven cache attacks. Moreover, Extreme Gradient Boosting algorithm provides better results.

Original languageEnglish
Title of host publicationUBMK 2019 - Proceedings, 4th International Conference on Computer Science and Engineering
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages564-568
Number of pages5
ISBN (Electronic)9781728139647
DOIs
Publication statusPublished - Sept 2019
Event4th International Conference on Computer Science and Engineering, UBMK 2019 - Samsun, Turkey
Duration: 11 Sept 201915 Sept 2019

Publication series

NameUBMK 2019 - Proceedings, 4th International Conference on Computer Science and Engineering

Conference

Conference4th International Conference on Computer Science and Engineering, UBMK 2019
Country/TerritoryTurkey
CitySamsun
Period11/09/1915/09/19

Bibliographical note

Publisher Copyright:
© 2019 IEEE.

Funding

ACKNOWLEDGMENT This work is supported by Istanbul Technical University under the BAP project, number MAB-2017-40642.

FundersFunder number
Istanbul Teknik ÜniversitesiMAB-2017-40642

    Keywords

    • machine learning
    • security
    • time-driven cache attacks

    Fingerprint

    Dive into the research topics of 'Machine Learning based Side Channel Selection for Time-Driven Cache Attacks on AES'. Together they form a unique fingerprint.

    Cite this