Automated Side-Channel Attacks using Black-Box Neural Architecture Search

被引:1
|
作者
Gupta, Pritha [1 ]
Drees, Jan Peter [2 ]
Huellermeier, Eyke [3 ]
机构
[1] Paderborn Univ, Paderborn, Germany
[2] Univ Wuppertal, Wuppertal, Germany
[3] Univ Munich LMU, Munich, Germany
基金
欧洲研究理事会;
关键词
Neural Architecture Search; Parameter Study; Convolutional Neural Network; Side-Channel Attack; AES;
D O I
10.1145/3600160.3600161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of convolutional neural networks (CNNs) to break cryptographic systems through hardware side-channels facilitated rapid and adaptable attacks on cryptographic systems like smart cards and Trusted Platform Modules (TPMs). However, current approaches rely on manually designed CNN architectures by domain experts, which are time-consuming and impractical for attacking new systems. To overcome this, recent research has delved into the use of neural architecture search (NAS) to discover appropriate CNN architectures automatically. This approach aims to alleviate the bur-den on human experts and facilitate more effcient exploration of new attack targets. However, these works only optimize the architecture using the secret key information from the attack dataset and explore limited search strategies with one-dimensional CNNs. In this work, we propose a fully black-box NAS approach that solely utilizes the profiling dataset for optimization. Through an extensive experimental parameter study, we investigate which choices for NAS, such as using 1-D or 2-D CNNs and various search strategies, produce the best results on 10 state-of-the-art datasets for identity leakage model. Our results demonstrate that applying the Random search strategy on 1-D inputs achieves a high success rate, enabling retrieval of the correct secret key using a single attack trace on two datasets. This combination matches the attack effciency of fixed CNN architectures and outperforms them in 4 out of 10 datasets. Our experiments also emphasize the importance of repeated attack evaluations for ML-based solutions to avoid biased performance estimates.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Adversarial Black-Box Attacks with Timing Side-Channel Leakage
    Nakai, Tsunato
    Suzuki, Daisuke
    Omatsu, Fumio
    Fujino, Takeshi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 143 - 151
  • [2] Automated Black-Box Detection of Side-Channel Vulnerabilities in Web Applications
    Chapman, Peter
    Evans, David
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 263 - 274
  • [3] When Side-Channel Attacks Break the Black-Box Property of Embedded Artificial Intelligence
    Coqueret, Benoit
    Carbone, Mathieu
    Sentieys, Olivier
    Zaid, Gabriel
    [J]. PROCEEDINGS OF THE 16TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2023, 2023, : 127 - 138
  • [4] Targeted Black-Box Side-Channel Mitigation for IoT
    Kadron, Ismet Burak
    Shou, Chaofan
    O'Mahony, Emily
    Vural, Yilmaz
    Bultan, Tevfik
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS 2022, IOT 2022, 2022, : 49 - 56
  • [5] Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis
    Yap, Trevor
    Benamira, Adrien
    Bhasin, Shivam
    Peyrin, Thomas
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 24 - 53
  • [6] Side-Channel Attacks on Shared Search Indexes
    Wang, Liang
    Grubbs, Paul
    Lu, Jiahui
    Bindschaedler, Vincent
    Cash, David
    Ristenpart, Thomas
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 673 - 692
  • [7] The investigation of neural networks performance in side-channel attacks
    Yinan Kong
    Ehsan Saeedi
    [J]. Artificial Intelligence Review, 2019, 52 : 607 - 623
  • [8] TinyPower: Side-Channel Attacks with Tiny Neural Networks
    Li, Haipeng
    Ninan, Mabon
    Wang, Boyang
    Emmert, John M.
    [J]. 2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 320 - 331
  • [9] The investigation of neural networks performance in side-channel attacks
    Kong, Yinan
    Saeedi, Ehsan
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2019, 52 (01) : 607 - 623
  • [10] Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems
    Novakovic, Chris
    Parker, David
    [J]. COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 319 - 337