Back to Search
Start Over
Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm
- Source :
- Lecture Notes in Computer Science ISBN: 9783030616373, ACNS Workshops
- Publication Year :
- 2020
- Publisher :
- Springer International Publishing, 2020.
-
Abstract
- Machine learning algorithms have been widely applied to solve various type of problems and applications. Among those, decision tree based algorithms have been considered for small Internet-of-Things (IoT) implementation, due to their simplicity. It has been shown in a recent publication, that Bonsai, a small tree-based algorithm, can be successfully fitted in a small 8-bit microcontroller. However, the security of machine learning algorithm has also been a major concern, especially with the threat of secret parameter recovery which could lead to breach of privacy. With machine learning taking over a significant proportion of industrial tasks, the security issue has become a matter of concern. Recently, secret parameter recovery for neural network based algorithm using physical side-channel leakage has been proposed. In the paper, we investigate the security of widely used decision tree algorithms running on ARM Cortex M3 platform against electromagnetic (EM) side-channel attacks. We show that by focusing on each building block function or component, one could perform divide-and-conquer approach to recover the secret parameters. To demonstrate the attack, we first report the recovery of secret parameters of Bonsai, such as, sparse projection parameters, branching function and node predictors. After the recovery of these parameters, the attacker can then reconstruct the whole architecture. This work was performed in the Cooperative Research Project of the Research Institute of Electrical Communication, Tohoku University with Nanyang Technological University. This research was also supported in part by JST CREST Grant No. JPMJCR19K5, Japan.
- Subjects :
- Artificial neural network
business.industry
Computer science
Computer science and engineering::Computing methodologies::Artificial intelligence [Engineering]
Side-channel Attacks
Node (networking)
Decision tree
Machine learning
computer.software_genre
Machine Learning
ARM architecture
Machine Learning Algorithms
Projection (relational algebra)
Component (UML)
Hardware Security
Artificial intelligence
Side channel attack
Computer science and engineering::Computing methodologies [Engineering]
business
Algorithm
computer
Block (data storage)
Subjects
Details
- ISBN :
- 978-3-030-61637-3
- ISBNs :
- 9783030616373
- Database :
- OpenAIRE
- Journal :
- Lecture Notes in Computer Science ISBN: 9783030616373, ACNS Workshops
- Accession number :
- edsair.doi.dedup.....9d036a078a484f2be6d7b8796e0920f6