When Side-Channel Attacks Break the Black-Box Property of Embedded Artificial Intelligence

被引:0
|
作者
Coqueret, Benoit [1 ,2 ]
Carbone, Mathieu [1 ]
Sentieys, Olivier [2 ]
Zaid, Gabriel [1 ]
机构
[1] Thales ITSEF, Toulouse, France
[2] Univ Rennes, INRIA, IRISA, Rennes, France
关键词
Deep learning; Embedded systems; Black box attack; Side-channel attack; Adversarial examples; NETWORKS;
D O I
10.1145/3605764.3623903
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial intelligence, and specifically deep neural networks (DNNs), has rapidly emerged in the past decade as the standard for several tasks from specific advertising to object detection. The performance offered has led DNN algorithms to become a part of critical embedded systems, requiring both efficiency and reliability. In particular, DNNs are subject to malicious examples designed in a way to fool the network while being undetectable to the human observer: the adversarial examples. While previous studies propose frameworks to implement such attacks in black box settings, those often rely on the hypothesis that the attacker has access to the logits of the neural network, breaking the assumption of the traditional black box. In this paper, we investigate a real black box scenario where the attacker has no access to the logits. In particular, we propose an architecture-agnostic attack which solve this constraint by extracting the logits. Our method combines hardware and software attacks, by performing a side-channel attack that exploits electromagnetic leakages to extract the logits for a given input, allowing an attacker to estimate the gradients and produce state-of-the-art adversarial examples to fool the targeted neural network. Through this example of adversarial attack, we demonstrate the effectiveness of logits extraction using side-channel as a first step for more general attack frameworks requiring either the logits or the confidence scores.
引用
收藏
页码:127 / 138
页数:12
相关论文
共 50 条
  • [1] Adversarial Black-Box Attacks with Timing Side-Channel Leakage
    Nakai, Tsunato
    Suzuki, Daisuke
    Omatsu, Fumio
    Fujino, Takeshi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 143 - 151
  • [2] Automated Side-Channel Attacks using Black-Box Neural Architecture Search
    Gupta, Pritha
    Drees, Jan Peter
    Huellermeier, Eyke
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [3] Targeted Black-Box Side-Channel Mitigation for IoT
    Kadron, Ismet Burak
    Shou, Chaofan
    O'Mahony, Emily
    Vural, Yilmaz
    Bultan, Tevfik
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS 2022, IOT 2022, 2022, : 49 - 56
  • [4] Automated Black-Box Detection of Side-Channel Vulnerabilities in Web Applications
    Chapman, Peter
    Evans, David
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 263 - 274
  • [5] Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis
    Yap, Trevor
    Benamira, Adrien
    Bhasin, Shivam
    Peyrin, Thomas
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 24 - 53
  • [6] When Failure Analysis Meets Side-Channel Attacks
    Di-Battista, Jerome
    Courrege, Jean-Christophe
    Rouzeyre, Bruno
    Torres, Lionel
    Perdu, Philippe
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 188 - +
  • [7] Black-box artificial intelligence: an epistemological and critical analysis
    Carabantes, Manuel
    [J]. AI & SOCIETY, 2020, 35 (02) : 309 - 317
  • [8] Black-box artificial intelligence: an epistemological and critical analysis
    Manuel Carabantes
    [J]. AI & SOCIETY, 2020, 35 : 309 - 317
  • [9] Hardening Embedded Networking Devices Against Side-Channel Attacks
    Liu, Donggang
    Dong, Qi
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2011, 12 (1-2) : 103 - 124
  • [10] Physical Side-Channel Attacks on Embedded Neural Networks: A Survey
    Real, Maria Mendez
    Salvador, Ruben
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (15):