DNNCloak: Secure DNN Models Against Memory Side-channel Based Reverse Engineering Attacks

被引:3
|
作者
Che, Yuezhi [1 ]
Wang, Rujia [1 ]
机构
[1] IIT, Chicago, IL 60616 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/ICCD56317.2022.00023
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As deep neural networks (DNN) expand their attention into various domains and the high cost of training a model, the structure of a DNN model has become a valuable intellectual property and needs to be protected. However, reversing DNN models by exploiting side-channel leakage has been demonstrated in various ways. Even if the model is encrypted and the processing hardware units are trusted, the attacker can still extract the model's structure and critical parameters through side channels, potentially posing significant commercial risks. In this paper, we begin by analyzing representative memory side-channel attacks on DNN models and identifying the primary causes of leakage. We also find that the full encryption used to protect model parameters could add extensive overhead. Based on our observations, we propose DNNCloak, a lightweight and secure framework aiming at mitigating reverse engineering attacks on common DNN architectures. DNNCloak includes a set of obfuscation schemes that increase the difficulty of reverse-engineering the DNN structure. Additionally, DNNCloak reduces the overhead of full weights encryption with an efficient matrix permutation scheme, resulting in reduced memory access time and enhanced security against retraining attacks on the model parameters. At last, we show how DNNCloak can defend DNN models from side-channel attacks effectively, with minimal performance overhead.
引用
收藏
页码:89 / 96
页数:8
相关论文
共 50 条
  • [21] Architecting against Software Cache-Based Side-Channel Attacks
    Kong, Jingfei
    Aciicmez, Onur
    Seifert, Jean-Pierre
    Zhou, Huiyang
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (07) : 1276 - 1288
  • [22] Practical Timing Side-Channel Attacks on Memory Compression
    Schwarzl, Martin
    Borrello, Pietro
    Saileshwar, Gururaj
    Mueller, Hanna
    Schwarz, Michael
    Gruss, Daniel
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1186 - 1203
  • [23] Improving side-channel attacks against pairing-based cryptography
    Damien Jauvart
    Nadia El Mrabet
    Jacques J. A. Fournier
    Louis Goubin
    Journal of Cryptographic Engineering, 2020, 10 : 1 - 16
  • [24] Improving side-channel attacks against pairing-based cryptography
    Jauvart, Damien
    El Mrabet, Nadia
    Fournier, Jacques J. A.
    Goubin, Louis
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 1 - 16
  • [25] Secure Quantum-based Adder Design for Protecting Machine Learning Systems Against Side-Channel Attacks
    Ul Ain, Noor
    Ahmadpour, Seyed-Sajad
    Navimipour, Nima Jafari
    Diakina, E.
    Kassa, Sankit R.
    APPLIED SOFT COMPUTING, 2025, 169
  • [26] MemWander: Memory Dynamic Remapping via Hypervisor Against Cache-Based Side-Channel Attacks
    Yang, Chao
    Guo, Yunfei
    Hu, Hongchao
    IEEE ACCESS, 2019, 7 : 2179 - 2199
  • [27] Practical Algebraic Side-Channel Attacks Against ACORN
    Adomnicai, Alexandre
    Masson, Laurent
    Fournier, Jacques J. A.
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 325 - 340
  • [28] ISA Extensions of Shuffling Against Side-Channel Attacks
    Zhou, Jiayun
    Qin, Guofeng
    Li, Lu
    Guo, Chun
    Wang, Weijia
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (03) : 761 - 773
  • [29] On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
    Dabosville, Guillaume
    Maghrebi, Houssem
    Lhuillery, Alexis
    Le, Thanh-Ha
    Bringer, Julien
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 214 - 221
  • [30] Extractors against side-channel attacks: weak or strong?
    Medwed, Marcel
    Standaert, Francois-Xavier
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (03) : 231 - 241