Guarding Machine Learning Hardware Against Physical Side-channel Attacks
نویسندگان
چکیده
Machine learning (ML) models can be trade secrets due to their development cost. Hence, they need protection against malicious forms of reverse engineering (e.g., in IP piracy). With a growing shift ML the edge devices, part for performance and privacy benefits, have become susceptible so-called physical side-channel attacks. being relatively new target compared cryptography poses problem analysis context that lacks published literature. The gap between burgeoning edge-based devices research on adequate defenses provide security them thus motivates our study. Our work develops combines different flavors hardware blocks. We propose optimize first defense based Boolean masking . implement all masked then present an adder optimization reduce area latency overheads. Finally, we couple it with shuffle-based defense. quantify area-delay overhead ranges from 5.4× 4.7× depending topology used demonstrate first-order millions power traces. Additionally, shuffle countermeasure impedes straightforward second-order attack implementation.
منابع مشابه
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks
Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elegant encryption algorithms. Even though there exist various defense mechanisms, most of them come with the extra overhead of implementation. Recent studies have prevented some particular categories of these attacks but fail to address the detection of other classes. This paper presents a generic ma...
متن کاملPhysical side-channel attacks on cryptographic systems
We survey a number of attacks on cryptographic systems which depend on measuring physical characteristics of such systems whilst a given cryptographic operation is carried out. Such measurements could include the time needed to perform certain operations, the power consumed or any electromagnetic radiation produced. As such the physical measurement is producing a side-channel for the cryptograp...
متن کاملDefend encryption systems against side- channel attacks
From its ancient origin as a tool for protecting sensitive wartime or espionage-related messages, cryptography has become a foundational building-block for securing the systems, protocols, and infrastructure that underpin our modern interconnected world. But the physical mechanisms used in performing encryption and decryption can leak information, making it possible to bypass this security. Pro...
متن کاملProvably Secure Countermeasures against Side-channel Attacks
Side-channel attacks exploit the fact that the implementations of cryptographic algorithms leak information about the secret key. In power analysis attacks, the observable leakage is the power consumption of the device, which is dependent on the processed data and the performed operations. Masking is a widely used countermeasure to thwart the powerful Differential Power Analysis (DPA) attacks. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Journal on Emerging Technologies in Computing Systems
سال: 2022
ISSN: ['1550-4832', '1550-4840']
DOI: https://doi.org/10.1145/3465377