Side-Channel Fuzzy Analysis-Based AI Model Extraction Attack With Information-Theoretic Perspective in Intelligent IoT

被引:11
|
作者
Pan, Qianqian [1 ,2 ]
Wu, Jun [1 ,2 ]
Bashir, Ali Kashif [3 ,4 ,5 ]
Li, Jianhua [1 ,2 ]
Wu, Jie [6 ]
机构
[1] Shanghai Jiao Tong Univ, Collaborat Innovat Ctr Shanghai Ind Internet, Shanghai Key Lab Integrated Adm Technol Informat, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[3] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, Lancs, England
[4] Natl Univ Sci & Technol Islamabad, Sch Elect Engn & Comp Sci, Islamabad 24090, Pakistan
[5] Univ Guelph, Sch Engn, Guelph, ON N1G 2W1, Canada
[6] Temple Univ, Ctr Networked Comp, Philadelphia, PA 19122 USA
基金
中国国家自然科学基金;
关键词
Artificial intelligence; Analytical models; Security; Biological system modeling; Data mining; Computational modeling; Information theory; Fuzzy analysis; information theory; intelligent Internet of Things (IoT); model extraction; side-channel attacks (SCAs); BLOCKCHAIN; MANAGEMENT; SCHEME;
D O I
10.1109/TFUZZ.2022.3172991
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Accessibility to smart devices provides opportunities for side-channel attacks (SCAs) on artificial intelligent (AI) models in the intelligent Internet of Things (IoT). However, the existing literature exposes some shortcomings: 1) incapability of quantifying and analyzing the leaked information through side channels of the intelligent IoT and 2) inability to devise efficient and accurate SCA algorithms. To address these challenges, we propose a side-channel fuzzy analysis-empowered AI model extraction attack in the intelligent IoT. First, the integrated AI model extraction framework is proposed, including power trace-based structure, execution time-based metaparameters, and hierarchical weight extractions. Then, we develop the information theory-based analysis for the AI model extraction via SCA. We derive a mutual information-enabled quantification method, theoretical lower/upper bounds of information leakage, and the minimum number of attack queries to obtain accurate weights. Furthermore, a fuzzy gray correlation-based multiple-microspace parallel SCA algorithm is proposed to extract model weights in the intelligent IoT. Based on the established information-theoretic analysis model, the proposed fuzzy gray correlation-based SCA algorithm obtains high-precision AI weights. Experimental results, consisting of simulation and real-world experiments, verify that the developed analysis method with the information-theoretic perspective is feasible and demonstrate that the designed fuzzy gray correlation-based SCA algorithm is effective for AI model extraction.
引用
收藏
页码:4642 / 4656
页数:15
相关论文
共 43 条
  • [21] Side-Channel Attack with Fault Analysis on Memristor-based Computation-in-Memory
    Sapui, Brojogopal
    Meschkov, Sergej
    Tahoori, Mehdi B.
    2024 IEEE 30TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN, IOLTS 2024, 2024,
  • [22] NNLeak: An AI-Oriented DNN Model Extraction Attack through Multi-Stage Side Channel Analysis
    Gao, Ya
    Ma, Haocheng
    Yan, Mingkai
    He, Jiaji
    Zhao, Yiqiang
    Jin, Yier
    2023 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM, ASIANHOST, 2023,
  • [23] Information Theory-based Evolution of Neural Networks for Side-channel Analysis
    Acharya R.Y.
    Ganji F.
    Forte D.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2023 (01): : 401 - 437
  • [24] Channel state information based key generation vs. side-channel analysis key information leakage
    Li H.
    Zhang Q.
    Yuan H.
    Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 264 - 268
  • [25] Information-theoretic analysis of a dynamic release site using a two-channel model of depression
    Mehrdad Salmasi
    Martin Stemmler
    Stefan Glasauer
    Alex Loebel
    BMC Neuroscience, 16 (Suppl 1)
  • [26] An Intelligent Framework for Cluster-Based Side-Channel Analysis on Public-Key Cryptosystems
    Wei, Congming
    He, Shulin
    Wang, An
    Sun, Shaofei
    Ding, Yaoling
    Zhang, Jingqi
    Zhu, Liehuang
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 1962 - 1973
  • [27] Mutual Information Analysis for Three-Phase Dynamic Current Mode Logic against Side-Channel Attack
    Kim, Hyunmin
    Han, Dong-Guk
    Hong, Seokhie
    ETRI JOURNAL, 2015, 37 (03) : 584 - 594
  • [28] A nonprofiled side-channel analysis based on variational lower bound related to mutual information
    Zhang, Chi
    Lu, Xiangjun
    Cao, Pei
    Gu, Dawu
    Guo, Zheng
    Xu, Sen
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (01)
  • [29] Multiprocessor information concealment architecture to prevent power analysis-based side channel attacks
    Ambrose, J. A.
    Ragel, R. G.
    Parameswaran, S.
    Ignjatovic, A.
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2011, 5 (01): : 1 - 15
  • [30] A nonprofiled side-channel analysis based on variational lower bound related to mutual information
    Chi ZHANG
    Xiangjun LU
    Pei CAO
    Dawu GU
    Zheng GUO
    Sen XU
    Science China(Information Sciences), 2023, 66 (01) : 277 - 295