With the recent advancements in machine learning theory, many commercial embedded micro-processors use neural network models for a variety of signal processing applications. However, their associated side-channel security vulnerabilities pose a major concern. There have been several proof-of-concept attacks demonstrating the extraction of their model parameters and input data. But, many of these attacks involve specific assumptions, have limited applicability, or pose huge overheads to the attacker. In this work, we study the side-channel vulnerabilities of embedded neural network implementations by recovering their parameters using timing-based information leakage and simple power analysis side-channel attacks. We demonstrate our attacks on popular micro-controller platforms over networks of different precisions such as floating point, fixed point, binary networks. We are able to successfully recover not only the model parameters but also the inputs for the above networks. Countermeasures against timing-based attacks are implemented and their overheads are analyzed.
翻译:随着机器学习理论的最近进展,许多商业嵌入式微处理器使用神经网络模型进行各种信号处理应用,然而,它们相关的侧通道安全弱点是一个重大关切问题。已经发生了几起证明概念攻击,表明其模型参数和输入数据的提取。但是,这些攻击中有许多涉及具体的假设,适用性有限,或对攻击者造成巨大的间接损失。在这项工作中,我们通过利用基于时间的信息渗漏和简单的电源分析侧道攻击来恢复参数,研究嵌入式神经网络执行的侧道弱点。我们展示了我们对流行微型控制器平台的进攻,其网络精度不同,如浮点、固定点、二元网络。我们不仅能够成功地恢复模型参数,而且能够成功地恢复上述网络的投入。我们实施了针对基于时间的攻击的对策,并分析了其顶部。