Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis
-
Published:2024-08-07
Issue:
Volume:
Page:
-
ISSN:2190-8508
-
Container-title:Journal of Cryptographic Engineering
-
language:en
-
Short-container-title:J Cryptogr Eng
Author:
Rezaeezade Azade,Batina Lejla
Abstract
AbstractDespite considerable achievements of deep learning-based side-channel analysis, overfitting represents a significant obstacle in finding optimized neural network models. This issue is not unique to the side-channel domain. Regularization techniques are popular solutions to overfitting and have long been used in various domains. At the same time, the works in the side-channel domain show sporadic utilization of regularization techniques. What is more, no systematic study investigates these techniques’ effectiveness. In this paper, we aim to investigate the regularization effectiveness on a randomly selected model, by applying 4 powerful and easy-to-use regularization techniques to 8 combinations of datasets, leakage models, and deep learning topologies. The investigated techniques are $$L_1$$
L
1
, $$L_2$$
L
2
, dropout, and early stopping. Our results show that while all these techniques can improve performance in many cases, $$L_1$$
L
1
and $$L_2$$
L
2
are the most effective. Finally, if training time matters, early stopping is the best technique.
Funder
Nederlandse Organisatie voor Wetenschappelijk Onderzoek the Netherlands Organisation for Scientific Research
Publisher
Springer Science and Business Media LLC
Reference41 articles.
1. Kocher, P. C., Jaffe, J., Jun, B.: Differential power analysis. In: M. J. Wiener, editor, Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, Lecture Notes in Computer Science, vol. 1666, pp. 388–397. Springer, (1999) 2. Quisquater, J., Samyde, D.: Electromagnetic analysis (EMA): measures and counter-measures for smart cards. In: I. Attali and T. P. Jensen, editors, Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings, Lecture Notes in Computer Science, vol. 2140, pp. 200–210. Springer, (2001) 3. Mangard, S., Oswald, E., Popp, T.: Power analysis attacks - revealing the secrets of smart cards. Springer, Berlin (2007) 4. Picek, S., Heuser, A., Perin, G., Guilley, S.: Profiled side-channel analysis in the efficient attacker framework. In: Grosso V. and T. Pöppelmann, (eds.) Smart Card Research and Advanced Applications - 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11-12, 2021, Revised Selected Papers, Lecture Notes in Computer Science, vol. 13173, pp. 44–63. Springer, (2021) 5. Chari, S., Rao, J. R., Rohatgi, P.: Template attacks. In: B. S. K. Jr., Ç. K. Koç, and Paar C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, Lecture Notes in Computer Science, vol. 2523, pp. 13–28. Springer, (2002)
|
|