Transactions on Cryptographic Hardware and Embedded Systems 2025
Chameleon:
A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis
Davide Galli
DEIB, Politecnico di Milano, Milan, Italy
Giuseppe Chiari
DEIB, Politecnico di Milano, Milan, Italy
Davide Zoni
DEIB, Politecnico di Milano, Milan, Italy
Keywords: Side-Channel Analysis, AES, Hiding Techniques, Dataset, Deep Learning, RISC-V
Abstract
Side-channel attacks exploit unintended information leakage emitted by cryptographic devices to extract sensitive data. Hiding techniques are a cost-effective countermeasure designed to obfuscate the side-channel leakage and hinder these attacks. Available open datasets rely on artificial models to simulate hiding effects, preventing a realistic assessment of these countermeasures and, thus, leaving a pressing need for datasets offering real-world, obfuscated side-channel measurements. Chameleon introduces the first comprehensive dataset of real-world, obfuscated power traces collected from a RISC-V-based System-on-Chip. The traces are obfuscated using four state-of-the-art hiding techniques: dynamic frequency scaling, random delay, morphing, and chaffing. Chameleon captures real leakage deformations introduced by actual hardware implementations, making it a realistic and valuable tool for evaluating side-channel countermeasures. A key feature of Chameleon is its dual focus on the segmentation and attack stages of the side-channel analysis process. It is the first dataset designed to facilitate the challenging task of segmenting cryptographic operations from obfuscated traces, offering precise metadata that pinpoints the start and end of each operation. The high-quality metadata enables systematic research into segmentation techniques, a critical step often overlooked in previous datasets. Chameleon provides an essential platform for researchers to develop and test new side-channel attacks, highlighting the vulnerabilities of current hiding techniques. By offering a more realistic assessment of countermeasure effectiveness, Chameleon is an invaluable tool for advancing the state-of-the-art in the side-channel evaluation.
Publication
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2025, Issue 3
PaperArtifact
Artifact number
tches/2025/a20
Artifact published
September 1, 2025
Badge
✅ IACR CHES Artifacts Available
Artifact files are available at the following external archive:
A dataset (600 GB) for this artifact is also available by request.
License
This work is licensed under the Apache License, Version 2.0.
Note that license information is supplied by the authors and has not been confirmed by the IACR.
BibTeX How to cite
Davide Galli, Giuseppe Chiari , Davide Zoni. (2025). Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(3), 389–412. https://doi.org/10.46586/tches.v2025.i3.389-412. Artifact at https://artifacts.iacr.org/tches/2025/a20.