计算机工程 ›› 2019, Vol. 45 ›› Issue (11): 144-151,158.doi: 10.19678/j.issn.1000-3428.0052538

• 安全技术 • 上一篇    下一篇

功耗分析攻击中机器学习模型选择研究

段晓毅, 陈东, 高献伟, 范晓红, 周玉坤   

  1. 北京电子科技学院 电子信息工程系, 北京 100070
  • 收稿日期:2018-09-03 修回日期:2018-11-01 发布日期:2018-11-09
  • 作者简介:段晓毅(1979-),男,讲师、博士,主研方向为信息安全;陈东,硕士研究生;高献伟,教授;范晓红,讲师;周玉坤,副教授。
  • 基金项目:
    国家自然科学基金(61701008);中央高校基本科研业务费专项资金(2017LG05)。

Research on Model Selection of Machine Learning in Power Analysis Attack

DUAN Xiaoyi, CHEN Dong, GAO Xianwei, FAN Xiaohong, ZHOU Yukun   

  1. Department of Electronics and Information Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China
  • Received:2018-09-03 Revised:2018-11-01 Published:2018-11-09

摘要: 根据密码芯片功耗曲线的特性,对支持向量机、随机森林、K最近邻、朴素贝叶斯4种机器学习算法进行分析研究,从中选择用于功耗分析攻击的最优算法。对于机器学习算法的数据选取问题,使用多组数量相同但组成元素不同的数据集的十折交叉验证结果进行模型选择,提高测试公平性及测试结果的泛化能力。为避免十折交叉验证过程中出现测试集误差不足以近似泛化误差的问题,采用Friedman检验及Nemenyi后续检验相结合的方法对4种机器学习算法进行评估,结果表明支持向量机是适用于功耗分析攻击的最优机器学习算法。

关键词: 机器学习, 十折交叉验证, Friedman检验, Nemenyi后续检验, 功耗分析攻击

Abstract: According to the characteristics of the power curve of crypto chips,four kinds of machine learning algorithms including Support Vector Machine(SVM),Random Forest(RF),K-Nearest Neighbor(KNN) and Naive Bayes(NB) are analyzed and studied,and the optimal algorithm for power analysis attack is selected.For the data selection problem of the machine learning algorithm,the 10-fold cross-validation results of multiple sets of data sets with the same number but different constituent elements are used to select the model,which improves the test fairness and the generalization ability of the test results.In order to avoid the problem that the test set error is not enough to approximate the generalization error during the 10-fold cross-validation process,the four kinds of machine learning algorithms are evaluated by the combination of Friedman test and Nemenyi post-hoc test.The results show that the SVM is the optimal machine learning algorithm for power analysis attack.

Key words: machine learning, 10-fold cross-validation, Friedman test, Nemenyi post-hoc test, power analysis attack

中图分类号: