SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?

被引:2
作者
Neskovic, Andrija [1 ]
Mulhem, Saleh [1 ]
Treff, Alexander [2 ]
Buchty, Rainer [1 ]
Eisenbarth, Thomas [2 ]
Berekovic, Mladen [1 ]
机构
[1] Univ Lubeck, Inst Comp Engn, Lubeck, Germany
[2] Univ Lubeck, Inst IT Secur, Lubeck, Germany
来源
2023 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD | 2023年
关键词
Artificial Intelligence; Accelerators; Side-channel Attacks; SystemC; Power Modeling;
D O I
10.1109/ICCAD57390.2023.10323687
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As training artificial intelligence (AI) models is a lengthy and hence costly process, leakage of such a model's internal parameters is highly undesirable. In the case of AI accelerators, side-channel information leakage opens up the threat scenario of extracting the internal secrets of pre-trained models. Therefore, sufficiently elaborate methods for design verification as well as fault and security evaluation at the electronic system level are in demand. In this paper, we propose estimating information leakage from the early design steps of AI accelerators to aid in a more robust architectural design. We first introduce the threat scenario before diving into SystemC as a standard method for early design evaluation and how this can be applied to threat modeling. We present two successful side-channel attack methods executed via SystemC-based power modeling: correlation power analysis and template attack, both leading to total information leakage. The presented models are verified against an industry-standard netlist-level power estimation to prove general feasibility and determine accuracy. Consequently, we explore the impact of additive noise in our simulation to establish indicators for early threat evaluation. The presented approach is again validated via a model-vs-netlist comparison, showing high accuracy of the achieved results. This work hence is a solid step towards fast attack deployment and, subsequently, the design of attack-resilient AI accelerators.
引用
收藏
页数:8
相关论文
共 35 条
[1]  
[Anonymous], Synopsys PrimePower
[2]  
Batina L, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P515
[3]   On the Dependability Lifecycle of Electrical/Electronic Product Development: The Dual-Cone V-Model [J].
Bauer, Bernhard ;
Ayache, Mouadh ;
Mulhem, Saleh ;
Nitzan, Meirav ;
Athavale, Jyotika ;
Buchty, Rainer ;
Berekovic, Mladen .
COMPUTER, 2022, 55 (09) :99-106
[4]   Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice [J].
Biryukov, Alex ;
Dinu, Daniel ;
Grossschaedl, Johann .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 :537-557
[5]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[6]   Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations [J].
Bronchain, Olivier ;
Hendrickx, Julien M. ;
Massart, Clement ;
Olshevsky, Alex ;
Standaert, Francois-Xavier .
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 :713-737
[7]   Side channel attacks for architecture extraction of neural networks [J].
Chabanne, Herve ;
Danger, Jean-Luc ;
Guiga, Linda ;
Kuhne, Ulrich .
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2021, 6 (01) :3-16
[8]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[9]  
Drechsler R., 2004, ADV FORMAL VERIFICAT
[10]  
Dubey A, 2020, PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P197, DOI [10.1109/host45689.2020.9300276, 10.1109/HOST45689.2020.9300276]