On (in)Security of Edge-based Machine Learning Against Electromagnetic Side-channels

被引:1
|
作者
Bhasin, Shivam [1 ]
Jap, Dirmanto [1 ]
Picek, Stjepan [2 ]
机构
[1] Nanyang Technol Univ, Temasek Labs, Singapore, Singapore
[2] Radboud Univ Nijmegen, Fac Sci, Nijmegen, Netherlands
基金
新加坡国家研究基金会;
关键词
Side-channel analysis; machine learning; edge computing; Electromagnetic radiation;
D O I
10.1109/EMCSI39492.2022.9889639
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Machine (deep) learning represents mainstream research and development direction. This success can be linked to the ever-increasing computational capabilities and vast amounts of available data, resulting in ever more sophisticated machine learning models. The design and training of such machine learning models are challenging and expensive tasks, which incentivize companies to protect and keep it secret. Additionally, the wide applicability of machine learning results in diverse deployment scenarios. Many machine learning architectures are deployed on edge devices, such as sensors or actuators, making them susceptible to side-channel attacks. This work surveys the research works considering electromagnetic side-channel and edge-based machine learning models. After discussing state-of-the-art attacks and countermeasures, we propose several open problems to be investigated in future research.
引用
收藏
页码:262 / 267
页数:6
相关论文
共 50 条
  • [1] SoCs security: a war against side-channels
    Guilley, S
    Pacalet, R
    [J]. ANNALS OF TELECOMMUNICATIONS, 2004, 59 (7-8) : 998 - 1009
  • [2] Scheduler-based Defenses against Cross-VM Side-channels
    Varadarajan, Venkatanathan
    Ristenpart, Thomas
    Swift, Michael
    [J]. PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 687 - 702
  • [3] Edge-based Discovery of Training Data for Machine Learning
    Feng, Ziqiang
    George, Shilpa
    Harkes, Jan
    Pillai, Padmanabhan
    Klatzky, Roberta
    Satyanarayanan, Mahadev
    [J]. 2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 145 - 158
  • [4] A lightweight optimized intrusion detection system using machine learning for edge-based IIoT security
    Tiwari, Ravi Shekhar
    Lakshmi, D.
    Das, Tapan Kumar
    Tripathy, Asis Kumar
    Li, Kuan-Ching
    [J]. TELECOMMUNICATION SYSTEMS, 2024, : 605 - 624
  • [5] Side-Channels Beyond the Cloud Edge : New Isolation Threats and Solutions
    Bazm, Mohammad-Mahdi
    Lacoste, Marc
    Sudholt, Mario
    Menaud, Jean-Marc
    [J]. 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [6] Eureka: Edge-Based Discovery of Training Data for Machine Learning
    Feng, Ziqiang
    George, Shilpa
    Harkes, Jan
    Klatzky, Roberta L.
    Satyanarayanan, Mahadev
    Pillai, Padmanabhan
    [J]. IEEE INTERNET COMPUTING, 2019, 23 (04) : 35 - 42
  • [7] Edge-based image segmentation: Machine learning from examples
    Brejl, M
    Sonka, M
    [J]. IEEE WORLD CONGRESS ON COMPUTATIONAL INTELLIGENCE, 1998, : 814 - 819
  • [8] Hardware Trojan Side-Channels Based on Physical Unclonable Functions
    Gong, Zheng
    Makkes, Marc X.
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 294 - 303
  • [9] Hardware trojan side-channels based on physical unclonable functions
    Gong, Zheng
    Makkes, Marc X.
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6633 : 294 - 303
  • [10] Communication-Efficient k-Means for Edge-Based Machine Learning
    Lu, Hanlin
    He, Ting
    Wang, Shiqiang
    Liu, Changchang
    Mahdavi, Mehrdad
    Narayanan, Vijaykrishnan
    Chan, Kevin S.
    Pasteris, Stephen
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 33 (10) : 2509 - 2523