Side-Channel Attack Analysis on In-Memory Computing Architectures

نویسندگان

چکیده

In-memory computing (IMC) systems have great potential for accelerating data-intensive tasks such as deep neural networks (DNNs). As DNN models are generally highly proprietary, the network architectures become valuable targets attacks. In IMC systems, since whole model is mapped on chip and weight memory read can be restricted, pre-mapped acts a ``black box'' users. However, localized stationary data patterns may subject to other this paper, we propose side-channel attack methodology architectures. We show that it possible extract architectural information from power trace measurements without any prior knowledge of network. first developed simulation framework emulate dynamic traces macros. then performed leakage analysis reverse engineer stored layer type, sequence, output channel/feature size convolution kernel Based extracted information, full potentially reconstructed Finally, discuss countermeasures building offer resistance these extraction attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

COMPUTING SCIENCE An Acoustic Side Channel Attack on Enigma

Breaking the encrypted message traffic from the German Enigma cipher machine was one of the key allied achievements of World War II, performed at Bletchley Park by a team led by Alan Turing. The work described in this paper was motivated by the historic significance of the Enigma, and the fact that we had the possibility of gaining access to one. This led to the realisation that it would be int...

متن کامل

Countermeasure against Side-Channel Attack in Shared Memory of TrustZone

In this paper we introduced countermeasures against side-channel attacks in the shared memory of TrustZone. We proposed zero-contention cache memory or policy between REE and TEE to prevent from TruSpy attacks in TrustZone. And we suggested that delay time of data path of REE is equal or similar to that of data path of TEE to prevent timing side-channel attacks. Also, we proposed security infor...

متن کامل

Power Analysis Based Side Channel Attack

Side channel attacks break the secret key of a cryptosystem using channels such as sound, heat, time and power consumption which are originally not intended to leak such information. Power analysis is a branch of side channel attacks where power consumption data is used as the side channel to attack the system. First using a device like an oscilloscope power traces are collected when the crypto...

متن کامل

Side-channel attack on labeling CAPTCHAs

We propose a new scheme of attack on the Microsoft’s ASIRRA CAPTCHA which represents a significant shortcut to the intended attacking path, as it is not based in any advance in the state of the art on the field of image recognition. After studying the ASIRRA Public Corpus, we conclude that the security margin as stated by their authors seems to be quite optimistic. Then, we analyze which of the...

متن کامل

Algebraic Side-Channel Attack on Twofish

While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Emerging Topics in Computing

سال: 2023

ISSN: ['2168-6750', '2376-4562']

DOI: https://doi.org/10.1109/tetc.2023.3257684