DNNCloak: Secure DNN Models Against Memory Side-channel Based Reverse Engineering Attacks

被引:3
|
作者
Che, Yuezhi [1 ]
Wang, Rujia [1 ]
机构
[1] IIT, Chicago, IL 60616 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/ICCD56317.2022.00023
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As deep neural networks (DNN) expand their attention into various domains and the high cost of training a model, the structure of a DNN model has become a valuable intellectual property and needs to be protected. However, reversing DNN models by exploiting side-channel leakage has been demonstrated in various ways. Even if the model is encrypted and the processing hardware units are trusted, the attacker can still extract the model's structure and critical parameters through side channels, potentially posing significant commercial risks. In this paper, we begin by analyzing representative memory side-channel attacks on DNN models and identifying the primary causes of leakage. We also find that the full encryption used to protect model parameters could add extensive overhead. Based on our observations, we propose DNNCloak, a lightweight and secure framework aiming at mitigating reverse engineering attacks on common DNN architectures. DNNCloak includes a set of obfuscation schemes that increase the difficulty of reverse-engineering the DNN structure. Additionally, DNNCloak reduces the overhead of full weights encryption with an efficient matrix permutation scheme, resulting in reduced memory access time and enhanced security against retraining attacks on the model parameters. At last, we show how DNNCloak can defend DNN models from side-channel attacks effectively, with minimal performance overhead.
引用
收藏
页码:89 / 96
页数:8
相关论文
共 50 条
  • [31] Design and Verification of Secure Cache Wrapper against Access-driven Side-Channel Attacks
    Niazmand, Behrad
    Azad, Siavoosh Payandeh
    Jervan, Gert
    Sepulveda, Johanna
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 672 - 676
  • [32] An Efficient Method against Side-Channel Attacks on ECC
    LIU Shuanggen~ 1
    2. College of Computer Information Engineering
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1573 - 1576
  • [33] Toward an RF side-channel reverse engineering tool
    Wilt, Miller L.
    Baker, Megan M.
    Papadakis, Stergios J.
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL CONFERENCE ON PHYSICAL ASSURANCE AND INSPECTION ON ELECTRONICS (PAINE), 2020,
  • [34] Threshold implementations against side-channel attacks and glitches
    Nikova, Svetla
    Rechberger, Christian
    Rijmen, Vincent
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 529 - +
  • [35] Extractors against Side-Channel Attacks: Weak or Strong?
    Medwed, Marcel
    Standaert, Francois-Xavier
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 256 - 272
  • [36] Robust Secure Charge-Sharing Symmetric Adiabatic Logic Against Side-Channel Attacks
    Monteiro, Cancio
    Takahashi, Yasuhiro
    Sekine, Toshikazu
    2013 36TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2013, : 732 - 736
  • [37] Randomization approaches for Secure SAR ADC design resilient against Power Side-Channel Attacks
    Karanth, Sumanth N.
    Oruganti, Sirish
    Wang, Meizhi
    Kulkarni, Jaydeep P.
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 282 - 292
  • [38] Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 690 - 702
  • [39] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    DATA SCIENCE, PT 1, 2017, 727 : 549 - 557
  • [40] NEWCACHE: SECURE CACHE ARCHITECTURE THWARTING CACHE SIDE-CHANNEL ATTACKS
    Liu, Fangfei
    Wu, Hao
    Mai, Kenneth
    Lee, Ruby B.
    IEEE MICRO, 2016, 36 (05) : 8 - 16