International Association for Cryptologic Research

International Association
for Cryptologic Research

Transactions on Cryptographic Hardware and Embedded Systems 2025

Chameleon:

A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis


Davide Galli
DEIB, Politecnico di Milano, Milan, Italy

Giuseppe Chiari
DEIB, Politecnico di Milano, Milan, Italy

Davide Zoni
DEIB, Politecnico di Milano, Milan, Italy


Keywords: Side-Channel Analysis, AES, Hiding Techniques, Dataset, Deep Learning, RISC-V


Abstract

Side-channel attacks exploit unintended information leakage emitted by cryptographic devices to extract sensitive data. Hiding techniques are a cost-effective countermeasure designed to obfuscate the side-channel leakage and hinder these attacks. Available open datasets rely on artificial models to simulate hiding effects, preventing a realistic assessment of these countermeasures and, thus, leaving a pressing need for datasets offering real-world, obfuscated side-channel measurements. Chameleon introduces the first comprehensive dataset of real-world, obfuscated power traces collected from a RISC-V-based System-on-Chip. The traces are obfuscated using four state-of-the-art hiding techniques: dynamic frequency scaling, random delay, morphing, and chaffing. Chameleon captures real leakage deformations introduced by actual hardware implementations, making it a realistic and valuable tool for evaluating side-channel countermeasures. A key feature of Chameleon is its dual focus on the segmentation and attack stages of the side-channel analysis process. It is the first dataset designed to facilitate the challenging task of segmenting cryptographic operations from obfuscated traces, offering precise metadata that pinpoints the start and end of each operation. The high-quality metadata enables systematic research into segmentation techniques, a critical step often overlooked in previous datasets. Chameleon provides an essential platform for researchers to develop and test new side-channel attacks, highlighting the vulnerabilities of current hiding techniques. By offering a more realistic assessment of countermeasure effectiveness, Chameleon is an invaluable tool for advancing the state-of-the-art in the side-channel evaluation.

Publication

IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2025, Issue 3

Paper

Artifact

Artifact number
tches/2025/a20

Artifact published
September 1, 2025

Badge
IACR CHES Artifacts Available

README

ZIP (240809 bytes)  

View on Github

Artifact files are available at the following external archive:

A dataset (600 GB) for this artifact is also available by request.

License
This work is licensed under the Apache License, Version 2.0.

Note that license information is supplied by the authors and has not been confirmed by the IACR.


BibTeX How to cite

Davide Galli, Giuseppe Chiari , Davide Zoni. (2025). Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(3), 389–412. https://doi.org/10.46586/tches.v2025.i3.389-412. Artifact at https://artifacts.iacr.org/tches/2025/a20.