Side-Channel Fuzzy Analysis-Based AI Model Extraction Attack With Information-Theoretic Perspective in Intelligent IoT

被引:11
|
作者
Pan, Qianqian [1 ,2 ]
Wu, Jun [1 ,2 ]
Bashir, Ali Kashif [3 ,4 ,5 ]
Li, Jianhua [1 ,2 ]
Wu, Jie [6 ]
机构
[1] Shanghai Jiao Tong Univ, Collaborat Innovat Ctr Shanghai Ind Internet, Shanghai Key Lab Integrated Adm Technol Informat, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[3] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, Lancs, England
[4] Natl Univ Sci & Technol Islamabad, Sch Elect Engn & Comp Sci, Islamabad 24090, Pakistan
[5] Univ Guelph, Sch Engn, Guelph, ON N1G 2W1, Canada
[6] Temple Univ, Ctr Networked Comp, Philadelphia, PA 19122 USA
基金
中国国家自然科学基金;
关键词
Artificial intelligence; Analytical models; Security; Biological system modeling; Data mining; Computational modeling; Information theory; Fuzzy analysis; information theory; intelligent Internet of Things (IoT); model extraction; side-channel attacks (SCAs); BLOCKCHAIN; MANAGEMENT; SCHEME;
D O I
10.1109/TFUZZ.2022.3172991
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Accessibility to smart devices provides opportunities for side-channel attacks (SCAs) on artificial intelligent (AI) models in the intelligent Internet of Things (IoT). However, the existing literature exposes some shortcomings: 1) incapability of quantifying and analyzing the leaked information through side channels of the intelligent IoT and 2) inability to devise efficient and accurate SCA algorithms. To address these challenges, we propose a side-channel fuzzy analysis-empowered AI model extraction attack in the intelligent IoT. First, the integrated AI model extraction framework is proposed, including power trace-based structure, execution time-based metaparameters, and hierarchical weight extractions. Then, we develop the information theory-based analysis for the AI model extraction via SCA. We derive a mutual information-enabled quantification method, theoretical lower/upper bounds of information leakage, and the minimum number of attack queries to obtain accurate weights. Furthermore, a fuzzy gray correlation-based multiple-microspace parallel SCA algorithm is proposed to extract model weights in the intelligent IoT. Based on the established information-theoretic analysis model, the proposed fuzzy gray correlation-based SCA algorithm obtains high-precision AI weights. Experimental results, consisting of simulation and real-world experiments, verify that the developed analysis method with the information-theoretic perspective is feasible and demonstrate that the designed fuzzy gray correlation-based SCA algorithm is effective for AI model extraction.
引用
收藏
页码:4642 / 4656
页数:15
相关论文
共 43 条
  • [1] Side-Channel Analysis-Based Model Extraction on Intelligent CPS: An Information Theory Perspective
    Pan, Qianqian
    Wu, Jun
    Lin, Xi
    Li, Jianhua
    IEEE CONGRESS ON CYBERMATICS / 2021 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS (ITHINGS) / IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) / IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) / IEEE SMART DATA (SMARTDATA), 2021, : 254 - 261
  • [2] An Information-Theoretic Model for Adaptive Side-Channel Attacks
    Koepf, Boris
    Basin, David
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 286 - 296
  • [3] An Information-Theoretic Model for Side-Channel Attacks in Embedded Hardware
    de Cherisey, Eloi
    Guilley, Sylvain
    Rioul, Olivier
    Piantanida, Pablo
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 310 - 314
  • [4] Analysis of Side-Channel Attack Based on Information Theory
    Mizuno, Hiroaki
    Iwai, Keisuke
    Tanaka, Hidema
    Kurokawa, Takakazu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (07) : 1523 - 1532
  • [5] Automatically deriving information-theoretic bounds for adaptive side-channel attacks
    Koepf, Boris
    Basin, David
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (01) : 1 - 31
  • [6] A Study on Information Security Attack based Side-Channel Attacks
    Kang, Young-Jin
    Bruce, Ndibanje
    Park, SuHyun
    Lee, HoonJae
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 61 - 65
  • [7] Side-channel analysis-based detection approach of hardware Trojans
    Wang, Li-Wei
    Luo, Hong-Wei
    Yao, Ruo-He
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2012, 40 (06): : 6 - 10
  • [8] A remark on a success rate model for side-channel attack analysis
    Andreas Wiemers
    Journal of Cryptographic Engineering, 2020, 10 : 269 - 274
  • [9] A remark on a success rate model for side-channel attack analysis
    Wiemers, Andreas
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (03) : 269 - 274
  • [10] Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm
    Jap, Dirmanto
    Yli-Mayry, Ville
    Ito, Akira
    Ueno, Rei
    Bhasin, Shivam
    Homma, Naofumi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 93 - 105