to a half, from 40 to 20 making a brute force at-
tack possible.
• A trade-off in time and accuracy. In our experi-
ment, the SECNNP model with a single convolu-
tional kernel size requires double the training time
compared with the equivalent CNNP model. Con-
sequently, training the SECNNP model with two
convolutional filter kernel size requires double the
efforts compared with that of the single convolu-
tional filter kernel size SECNNP model.
6 CONCLUSION
This paper has proposed a modified approach for
building CNN-based models for profiling SCAs. A
MLS layer which combines the Maximum likelihood
scores of multiple models and multiple traces into
the training of the model is proposed. A new net-
work structure, which includes the input of the MLS
and the probability of the hypothesis keys predicted
from different traces by different CNNP models into
the re-training process is introduced for improved re-
sults over the state-of-the-art. The proposed SEC-
NNP models require half of the traces in compari-
son with the state-of-the-art CNNP models in attack-
ing a masked AES implementation from the open-
source ASCAD database and key recovery from just
20 traces is possible when targeting the variable key
database.
While considerable work has been done in the area
of ML for SCA, there is still significant scope for
improvement in current approaches. The experimen-
tation in this work is conducted on traces acquired
from an embedded device with software based coun-
termeasures. Future work could involve an analysis
of how the plaintext embedding approach transfers to
attack against hardware based countermeasures such
as threshold or dual-rail logic approaches.
ACKNOWLEDGEMENTS
We would like to thank the people and organizations
who support the research and helped improve the
paper: The UK Research Institute in Secure Hard-
ware and Embedded Systems (RISE) and The EPSRC
Quantum Communications Hub (EP/T001011/1).
REFERENCES
Brier, E., Clavier, C., and Olivier, F. (2004). Correlation
Power Analysis with a Leakage Model. volume 3156,
pages 16–29.
Chen, Z. and Zhou, Y. (2006). Dual-Rail Random Switch-
ing Logic: A Countermeasure to Reduce Side Channel
Leakage. In Goubin, L. and Matsui, M., editors, Cryp-
tographic Hardware and Embedded Systems - CHES
2006, pages 242–254, Berlin, Heidelberg. Springer
Berlin Heidelberg.
D, J. and Tymen, C. (2002). Multiplicative Masking and
Power Analysis of AES. IACR Cryptology ePrint
Archive, 2002:91.
Gebotys, C. H., Ho, S., and Tiu, C. C. (2005). EM Anal-
ysis of Rijndael and ECC on a Wireless Java-Based
PDA. In Rao, J. R. and Sunar, B., editors, Crypto-
graphic Hardware and Embedded Systems – CHES
2005, pages 250–264, Berlin, Heidelberg. Springer
Berlin Heidelberg.
Gilmore, R., Hanley, N., and O’Neill, M. (2015). Neu-
ral network based attack on a masked implementation
of AES. In 2015 IEEE International Symposium on
Hardware Oriented Security and Trust (HOST), pages
106–111.
Goubin L., M. A. . (2011). Protecting AES with Shamir’s
Secret Sharing Scheme., volume 6917 of Lecture
Notes in Computer Science. Springer, Berlin, Heidel-
berg.
Hettwer, B., Gehrer, S., and G
¨
uneysu, T. (2018). Profiled
Power Analysis Attacks Using Convolutional Neural
Networks with Domain Knowledge. In Cid, C. and
Jr., M. J. J., editors, Selected Areas in Cryptography -
SAC 2018 - 25th International Conference, Calgary,
AB, Canada, August 15-17, 2018, Revised Selected
Papers, volume 11349 of Lecture Notes in Computer
Science, pages 479–498. Springer.
Hoang, A.-T. and Fujino, T. (2014). Intra-Masking Dual-
Rail Memory on LUT Implementation for SCA-
Resistant AES on FPGA. ACM Trans. Reconfigurable
Technol. Syst., 7(2):10:1–10:19.
Hoang, A.-T., Hanley, N., and O’Neill, M. (2020). Plain-
text: A Missing Feature for Enhancing the Power of
Deep Learning in Side-Channel Analysis? Break-
ing multiple layers of side-channel countermeasures.
IACR Transactions on Cryptographic Hardware and
Embedded Systems, 2020(4):49–85.
Kim, J., Picek, S., Heuser, A., Bhasin, S., and Han-
jalic, A. (2019). Make Some Noise. Unleashing
the Power of Convolutional Neural Networks for
Profiled Side-channel Analysis. IACR Transactions
on Cryptographic Hardware and Embedded Systems,
2019(3):148–179.
Kocher, P. C. (1996). Timing Attacks on Implementa-
tions of Diffie-Hellman, RSA, DSS, and Other Sys-
tems. In Proceedings of the 16th Annual Interna-
tional Cryptology Conference on Advances in Cryp-
tology, CRYPTO ’96, pages 104–113, London, UK,
UK. Springer-Verlag.
Kocher, P. C., Jaffe, J., and Jun, B. (1999). Differential
Power Analysis. In Proceedings of the 19th Annual
International Cryptology Conference on Advances in
Cryptology, CRYPTO ’99, pages 388–397, Berlin,
Heidelberg. Springer-Verlag.
Stacked Ensemble Model for Enhancing the DL based SCA
67