5 research outputs found

    When NAS Meets Watermarking: Ownership Verification of DNN Models via Cache Side Channels

    Full text link
    We present a novel watermarking scheme to verify the ownership of DNN models. Existing solutions embedded watermarks into the model parameters, which were proven to be removable and detectable by an adversary to invalidate the protection. In contrast, we propose to implant watermarks into the model architectures. We design new algorithms based on Neural Architecture Search (NAS) to generate watermarked architectures, which are unique enough to represent the ownership, while maintaining high model usability. We further leverage cache side channels to extract and verify watermarks from the black-box models at inference. Theoretical analysis and extensive evaluations show our scheme has negligible impact on the model performance, and exhibits strong robustness against various model transformations

    A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

    No full text
    Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. One popular type of such attacks is the microarchitectural attack, where the adversary exploits the hardware features to break the protection enforced by the operating system and steal the secrets from the program. In this article, we systematize microarchitectural side channels with a focus on attacks and defenses in cryptographic applications. We make three contributions. (1) We survey past research literature to categorize microarchitectural side-channel attacks. Since these are hardware attacks targeting software, we summarize the vulnerable implementations in software, as well as flawed designs in hardware. (2) We identify common strategies to mitigate microarchitectural attacks, from the application, OS, and hardware levels. (3) We conduct a large-scale evaluation on popular cryptographic applications in the real world and analyze the severity, practicality, and impact of side-channel vulnerabilities. This survey is expected to inspire sidechannel research community to discover new attacks, and more importantly, propose new defense solutions against them.National Research Foundation (NRF)Submitted/Accepted versionThis project is supported by the National Research Foundation, Singapore, under its National Cybersecurity R&D Pro- gramme (CHFA-GC1-AW03), and NTU Start-up grant

    Security Issues and Challenges for Virtualization Technologies

    No full text
    corecore