Side-channel attacks that use machine learning (ML) for signal analysis have become prominent threats to computer security, as ML models easily find patterns in signals. To address this problem, this paper explores using Adversarial Machine Learning (AML) methods as a defense at the computer architecture layer to obfuscate side channels. We call this approach Defensive ML, and the generator to obfuscate signals, defender. Defensive ML is a workflow to design, implement, train, and deploy defenders for different environments. First, we design a defender architecture given the physical characteristics and hardware constraints of the side-channel. Next, we use our DefenderGAN structure to train the defender. Finally, we apply defensive ML to thwart two side-channel attacks: one based on memory contention and the other on application power. The former uses a hardware defender with ns-level response time that attains a high level of security with half the performance impact of a traditional scheme; the latter uses a software defender with ms-level response time that provides better security than a traditional scheme with only 70% of its power overhead.
翻译:使用机器学习(ML)进行信号分析的侧向攻击已成为对计算机安全的突出威胁,因为ML模型很容易找到信号模式。为解决这一问题,本文件探索使用反转机学习(AML)方法作为计算机结构层的防御工具,以混淆侧道。我们称之为防御性ML, 和发电机来混淆信号。防御性ML是设计、实施、培训和在不同环境中部署捍卫者的工作流程。首先,我们设计了一个防御性结构,考虑到侧道的物理特征和硬件限制。接下来,我们使用我们的防御性GAN结构来训练捍卫者。最后,我们运用防御性ML来挫败两道侧道攻击:一个是基于记忆争论,另一个是基于应用力。我们用的是具有n级反应时间的硬件防御,其反应时间达到高度,其反应时间的一半是传统办法的性能影响;后者使用具有ms级反应时间的软件防御系统,提供比传统办法更好的安全,只有70%的功率。