Side-Channel Attack Analysis on In-Memory Computing Architectures
نویسندگان
چکیده
In-memory computing (IMC) systems have great potential for accelerating data-intensive tasks such as deep neural networks (DNNs). As DNN models are generally highly proprietary, the network architectures become valuable targets attacks. In IMC systems, since whole model is mapped on chip and weight memory read can be restricted, pre-mapped acts a ``black box'' users. However, localized stationary data patterns may subject to other this paper, we propose side-channel attack methodology architectures. We show that it possible extract architectural information from power trace measurements without any prior knowledge of network. first developed simulation framework emulate dynamic traces macros. then performed leakage analysis reverse engineer stored layer type, sequence, output channel/feature size convolution kernel Based extracted information, full potentially reconstructed Finally, discuss countermeasures building offer resistance these extraction attack.
منابع مشابه
COMPUTING SCIENCE An Acoustic Side Channel Attack on Enigma
Breaking the encrypted message traffic from the German Enigma cipher machine was one of the key allied achievements of World War II, performed at Bletchley Park by a team led by Alan Turing. The work described in this paper was motivated by the historic significance of the Enigma, and the fact that we had the possibility of gaining access to one. This led to the realisation that it would be int...
متن کاملCountermeasure against Side-Channel Attack in Shared Memory of TrustZone
In this paper we introduced countermeasures against side-channel attacks in the shared memory of TrustZone. We proposed zero-contention cache memory or policy between REE and TEE to prevent from TruSpy attacks in TrustZone. And we suggested that delay time of data path of REE is equal or similar to that of data path of TEE to prevent timing side-channel attacks. Also, we proposed security infor...
متن کاملPower Analysis Based Side Channel Attack
Side channel attacks break the secret key of a cryptosystem using channels such as sound, heat, time and power consumption which are originally not intended to leak such information. Power analysis is a branch of side channel attacks where power consumption data is used as the side channel to attack the system. First using a device like an oscilloscope power traces are collected when the crypto...
متن کاملSide-channel attack on labeling CAPTCHAs
We propose a new scheme of attack on the Microsoft’s ASIRRA CAPTCHA which represents a significant shortcut to the intended attacking path, as it is not based in any advance in the state of the art on the field of image recognition. After studying the ASIRRA Public Corpus, we conclude that the security margin as stated by their authors seems to be quite optimistic. Then, we analyze which of the...
متن کاملAlgebraic Side-Channel Attack on Twofish
While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Emerging Topics in Computing
سال: 2023
ISSN: ['2168-6750', '2376-4562']
DOI: https://doi.org/10.1109/tetc.2023.3257684