The Dataset Viewer has been disabled on this dataset.

DFS_DESYNCH

The DFS_DESYNCH dataset contains power traces of a software AES implementation running on a 32-bit RISC-V System-on-Chip (SoC). The SoC incorporates a Dynamic Frequency Scaling (DFS) unit that randomly adjusts the operating frequency between 35MHz and 60MHz.

The dataset is designed to aid research in side-channel analysis methodologies.
DFS_DESYNCH was created to support the DLaTA methodology [1] for resynchronizing power traces collected under frequency scaling. The code for DLaTA is publicly available on GitHub.

How to Download

  1. Download dataset.
    ⚠ WARNING: Full dataset requires 205 GB of space.

    from huggingface_hub import snapshot_download
    
    snapshot_download(repo_id="hardware-fab/DFS_DESYNCH", repo_type="dataset", local_dir="<download_path>")
    
  2. Assemble dataset chunks in one (virtual) dataset file.

    python assemble.py --dataset_dir <download_path>
    

    Replace <download_path> with the actual download path. The assemble.py script is downloaded along with the data.

Dataset Structure

The dataset has the following structure:

  • Profiling and Attack groups: The traces are separated into two main groups: "profiling" and "attack". Each group contains 128,000 traces for a total of 256,000 traces.
  • Three Datasets per group: Each group ("profiling" and "attack") consists of three internal datasets:
    • traces: This dataset includes 128,000 power traces, each containing 200,000 time samples. The traces capture the entire AES encryption process preceded by a sequence of random instructions. The traces are pre-processed with a high-pass filter with a 125 kHz cut-off frequency.
    • labels: This dataset provides labels for each power trace in the "traces" dataset, indicating the frequency changes that occurred during the measurement. Each label has two fields:
      • sample: This field denotes the time sample at which a frequency change happens, with values ranging from 0 to 200,000.
      • frequency: This field specifies the new operating frequency starting from the corresponding sample. It can take values from the set {35, 40, 45, 50, 55, 60}.
    • metadata: This dataset contains metadata for each trace, including two members:
      • key: The secret key used for AES encryption.
      • plaintext: The plaintext used for the AES encryption.

Dataset Format

The dataset is stored in the HDF5 file format. To alleviate the size of the file, we partitioned the dataset into 32 files based on the cryptographic key. Keys are 16-byte arrays, we vary only the first byte keeping the remaining 15 fixed.

Chunk First key byte values Disk size (GB) # Data
dfs_desynch_chunk_0.h5 [0x00-0x07] 6.4 8k
dfs_desynch_chunk_1.h5 [0x08-0x0f] 6.4 8k
dfs_desynch_chunk_2.h5 [0x10-0x17] 6.4 8k
dfs_desynch_chunk_3.h5 [0x18-0x1f] 6.4 8k
dfs_desynch_chunk_4.h5 [0x20-0x27] 6.4 8k
dfs_desynch_chunk_5.h5 [0x28-0x2f] 6.4 8k
dfs_desynch_chunk_7.h5 [0x30-0x37] 6.4 8k
dfs_desynch_chunk_7.h5 [0x38-0x3f] 6.4 8k
dfs_desynch_chunk_8.h5 [0x40-0x47] 6.4 8k
dfs_desynch_chunk_9.h5 [0x48-0x4f] 6.4 8k
dfs_desynch_chunk_10.h5 [0x50-0x57] 6.4 8k
dfs_desynch_chunk_11.h5 [0x58-0x5f] 6.4 8k
dfs_desynch_chunk_12.h5 [0x60-0x67] 6.4 8k
dfs_desynch_chunk_13.h5 [0x68-0x6f] 6.4 8k
dfs_desynch_chunk_14.h5 [0x70-0x77] 6.4 8k
dfs_desynch_chunk_15.h5 [0x78-0x7f] 6.4 8k
dfs_desynch_chunk_16.h5 [0x80-0x87] 6.4 8k
dfs_desynch_chunk_17.h5 [0x88-0x8f] 6.4 8k
dfs_desynch_chunk_18.h5 [0x90-0x97] 6.4 8k
dfs_desynch_chunk_19.h5 [0x98-0x9f] 6.4 8k
dfs_desynch_chunk_20.h5 [0xa0-0xa7] 6.4 8k
dfs_desynch_chunk_21.h5 [0xa8-0xaf] 6.4 8k
dfs_desynch_chunk_22.h5 [0xb0-0xb7] 6.4 8k
dfs_desynch_chunk_23.h5 [0xb8-0xbf] 6.4 8k
dfs_desynch_chunk_24.h5 [0xc0-0xc7] 6.4 8k
dfs_desynch_chunk_25.h5 [0xc8-0xcf] 6.4 8k
dfs_desynch_chunk_26.h5 [0xd0-0xd7] 6.4 8k
dfs_desynch_chunk_27.h5 [0xd8-0xdf] 6.4 8k
dfs_desynch_chunk_28.h5 [0xe0-0xe7] 6.4 8k
dfs_desynch_chunk_20.h5 [0xe8-0xef] 6.4 8k
dfs_desynch_chunk_30.h5 [0xf0-0xf7] 6.4 8k
dfs_desynch_chunk_31.h5 [0xf8-0xff] 6.4 8k

Following the structure of the dataset, below are HDF5 fields used and their atomic type:

.  
β”œβ”€β”€ profiling  
β”‚    β”œβ”€β”€ traces [float32]
β”‚    β”œβ”€β”€ labels [('sample', uint32), ('frequency', uint32)]  
β”‚    └── metadata [('key', np.uint8, (16,)), ('plaintext', np.uint8, (16,))]
└── attack  
     β”œβ”€β”€ traces [float32]
     β”œβ”€β”€ labels [('sample', uint32), ('frequency', uint32)]  
     └── metadata [('key', np.uint8, (16,)), ('plaintext', np.uint8, (16,))]    

Dataset Collection

The data are collected from a real-world hardware-software infrastructure. The setup comprises a host PC, a Picoscope 5244d digital sampling oscilloscope (DSO), and a NewAE CW305 board which hosts an AMD Artix-7 FPGA. The board is specifically designed to facilitate the deployment of digital designs targeting FPGAs and studying their side-channel behavior. The sampling rate of the DSO is set to 125Msample/s with a resolution of 12 bits for the entire dataset.

The FPGA implements a system-on-chip consisting of a 1.5Mps UART interface to communicate with the host, an in-order 32-bit RISC-V CPU to execute the user applications, a CLK_LBL_GEN unit to label the operating frequency digitally, and a DFS actuator to change the operating frequency at runtime. The DFS actuator is instructed to change the operating frequency of the computing platform randomly at its maximum speed.

As the cryptographic operation of choice, we selected the OpenSSL AES implementation, representing the standard for symmetric cryptography.

Social Impact of Dataset

DFS_DESYNCH has been developed to enhance side-channel security. Notably, the side-channel analysis represents a standard procedure for evaluating novel countermeasures. Indeed, the NIST FIPS-140v3 standard enforces side-channel security as a mandatory step in the security validation of any novel software- and hardware-implemented cryptographic device. To this end, DFS_DESYNCH is a valuable asset in strengthening real-world security by enabling researchers to identify and address potential weaknesses in cryptographic implementations. By promoting the creation of robust countermeasures, this dataset ultimately contributes to a more secure digital world.

As creating a high-quality training dataset is a fundamental requirement, the quality of DFS_DESYNCH sits on the time-consuming acquisition process that requires a clean-room acquisition setup and system-on-chip. Without considering the design time to obtain the implementation of the computing platform and the working acquisition setup, the time required by the acquisition procedure exceeded 40 hours.

Citation

@ARTICLE{10713265,
  author={Galli, Davide and Lattari, Francesco and Matteucci, Matteo and Zoni, Davide},
  journal={IEEE Transactions on Computers}, 
  title={A Deep Learning-Assisted Template Attack Against Dynamic Frequency Scaling Countermeasures}, 
  year={2025},
  volume={74},
  number={1},
  pages={293-306},
  doi={10.1109/TC.2024.3477997}
}

Note

This work is part of [1] available online.

This repository is protected by copyright and licensed under the Open Data Commons License cc-by-4.0 file.

Β© 2024 hardware-fab

[1] D. Galli, F. Lattari, M. Matteucci and D. Zoni, "A Deep Learning-assisted Template Attack Against Dynamic Frequency Scaling Countermeasures," in IEEE Transactions on Computers, doi: 10.1109/TC.2024.3477997.

Downloads last month
4