Guarding Machine Learning Hardware Against Physical Side-channel Attacks

نویسندگان

چکیده

Machine learning (ML) models can be trade secrets due to their development cost. Hence, they need protection against malicious forms of reverse engineering (e.g., in IP piracy). With a growing shift ML the edge devices, part for performance and privacy benefits, have become susceptible so-called physical side-channel attacks. being relatively new target compared cryptography poses problem analysis context that lacks published literature. The gap between burgeoning edge-based devices research on adequate defenses provide security them thus motivates our study. Our work develops combines different flavors hardware blocks. We propose optimize first defense based Boolean masking . implement all masked then present an adder optimization reduce area latency overheads. Finally, we couple it with shuffle-based defense. quantify area-delay overhead ranges from 5.4× 4.7× depending topology used demonstrate first-order millions power traces. Additionally, shuffle countermeasure impedes straightforward second-order attack implementation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks

Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elegant encryption algorithms. Even though there exist various defense mechanisms, most of them come with the extra overhead of implementation. Recent studies have prevented some particular categories of these attacks but fail to address the detection of other classes. This paper presents a generic ma...

متن کامل

Physical side-channel attacks on cryptographic systems

We survey a number of attacks on cryptographic systems which depend on measuring physical characteristics of such systems whilst a given cryptographic operation is carried out. Such measurements could include the time needed to perform certain operations, the power consumed or any electromagnetic radiation produced. As such the physical measurement is producing a side-channel for the cryptograp...

متن کامل

Defend encryption systems against side- channel attacks

From its ancient origin as a tool for protecting sensitive wartime or espionage-related messages, cryptography has become a foundational building-block for securing the systems, protocols, and infrastructure that underpin our modern interconnected world. But the physical mechanisms used in performing encryption and decryption can leak information, making it possible to bypass this security. Pro...

متن کامل

Provably Secure Countermeasures against Side-channel Attacks

Side-channel attacks exploit the fact that the implementations of cryptographic algorithms leak information about the secret key. In power analysis attacks, the observable leakage is the power consumption of the device, which is dependent on the processed data and the performed operations. Masking is a widely used countermeasure to thwart the powerful Differential Power Analysis (DPA) attacks. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Journal on Emerging Technologies in Computing Systems

سال: 2022

ISSN: ['1550-4832', '1550-4840']

DOI: https://doi.org/10.1145/3465377