ThermalAttackNet: Are CNNs Making It Easy to Perform Temperature Side-Channel Attack in Mobile Edge Devices?
Abstract
:1. Introduction
- Design and explore thermal side-channel attack using computer vision-based CNN models.
- Evaluate popular CNN models and their accuracy in predicting password for different Linux governors.
- Design and implementation of a power- and memory-efficient CNN model, ThermalAttackNet, to perform thermal side-channel attack on a real consumer mobile device.
2. Preliminaries
2.1. Convolutional Neural Networks and Deep Learning
2.2. Pre-Trained Networks and Transfer Learning
3. Thermal Side-Channel Attack Using CNN
3.1. Hardware & Software Setup for Experiments
- ondemand: Sets the operating frequency of the CPU depending on the CPU utilization. In this, the operating frequency is set to maximum whenever there is any load on the CPU.
- conservative: Is a fork of ondemand governor and sets the operating frequency of the CPU depending on the CPU utilization. It differs from ondemand by increasing or decreasing the operating frequency of the CPU gradually based on the CPU utilization.
- performance: Sets the operating frequency of the CPU to the highest frequency within the borders of user specified minimum frequency and maximum frequency.
- powersaver: Compared to performance, this governor sets the operating frequency of the CPU to the lowest frequency within the borders of user specified minimum frequency and maximum frequency.
- interactive: Dynamically scales CPU operating frequency in response to the CPU utilization. Interactive is significantly more responsive than ondemand because it scales the operation frequency over the course of time to max frequency based on the CPU utilization.
3.2. Dataset and CNN Model
3.3. Training CNN to Predict Password
4. ThermalAttackNet: Proposed CNN Architecture
5. Experimental and Evaluation Results
5.1. Which CNN Model Is Best at Predicting Password
5.2. Power Consumption of CNNs
6. Extensive Evaluation on a Commercial Mobile Device
7. Discussion & Future Works
8. Conclusions
9. Code Availability
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Dinh, T.Q.; Tang, J.; La, Q.D.; Quek, T.Q. Offloading in mobile edge computing: Task allocation and computational frequency scaling. IEEE Trans. Commun. 2017, 65, 3571–3584. [Google Scholar]
- Singh, A.K.; Dey, S.; Basireddy, K.R.; McDonald-Maier, K.; Merrett, G.V.; Al-Hashimi, B.M. Dynamic Energy and Thermal Management of Multi-Core Mobile Platforms: A Survey. IEEE Des. Test. 2020, 37, 25–33. [Google Scholar] [CrossRef]
- Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge computing: Vision and challenges. IEEE Internet Things J. 2016, 3, 637–646. [Google Scholar] [CrossRef]
- Ambrose, J.A.; Ragel, R.G.; Jayasinghe, D.; Li, T.; Parameswaran, S. Side channel attacks in embedded systems: A tale of hostilities and deterrence. In Proceedings of the 2015 16th International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA, 2–4 March 2015; pp. 452–459. [Google Scholar]
- De Haas, J. Side Channel Attacks and Countermeasures for Embedded Systems; Black Hat: Las Vegas, NV, USA, 2007; p. 82. [Google Scholar]
- Hutter, M.; Schmidt, J.M. The temperature side channel and heating fault attacks. In International Conference on Smart Card Research and Advanced Applications; Springer: Cham, Switzerland, 2013; pp. 219–235. [Google Scholar]
- van Elsloo, T. Multi-Objective Optimization of Secure Embedded Systems Architectures. 2016. [Google Scholar]
- Dey, S.; Guajardo, E.Z.; Basireddy, K.R.; Wang, X.; Singh, A.K.; McDonald-Maier, K. Edgecoolingmode: An agent based thermal management mechanism for dvfs enabled heterogeneous mpsocs. In Proceedings of the 2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID), Delhi, India, 5–9 January 2019; pp. 19–24. [Google Scholar]
- Dey, S.; Singh, A.K.; Wang, X.; McDonald-Maier, K.D. DeadPool: Performance Deadline Based Frequency Pooling and Thermal Management Agent in DVFS Enabled MPSoCs. In Proceedings of the 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Paris, France, 21–23 June 2019; pp. 190–195. [Google Scholar]
- Dey, S.; Singh, A.K.; Prasad, D.K.; Mcdonald-Maier, K.D. SoCodeCNN: Program Source Code for Visual CNN Classification Using Computer Vision Methodology. IEEE Access 2019, 7, 157158–157172. [Google Scholar] [CrossRef]
- Isuwa, S.; Dey, S.; Singh, A.K.; McDonald-Maier, K. Teem: Online thermal-and energy-efficiency management on cpu-gpu mpsocs. In Proceedings of the 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), Florence, Italy, 25–29 March 2019; pp. 438–443. [Google Scholar]
- Dey, S.; Singh, A.; Wang, X.; McDonald-Maier, K. User Interaction Aware Reinforcement Learning for Power and Thermal Efficiency of CPU-GPU Mobile MPSoCs. In Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France, 9–13 March 2020; pp. 1728–1733. [Google Scholar]
- Dey, S.; Singh, A.K.; Saha, S.; Wang, X.; McDonald-Maier, K.D. RewardProfiler: A Reward Based Design Space Profiler on DVFS Enabled MPSoCs. In Proceedings of the 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Paris, France, 21–23 June 2019; pp. 210–220. [Google Scholar]
- Masti, R.J.; Rai, D.; Ranganathan, A.; Müller, C.; Thiele, L.; Capkun, S. Thermal Covert Channels on Multi-core Platforms. In Proceedings of the USENIX Security Symposium, Washington, DC, USA, 12–14 August 2015. [Google Scholar]
- Bartolini, D.B.; Miedl, P.; Thiele, L. On the capacity of thermal covert channels in multicores. In Proceedings of the Eleventh European Conference on Computer Systems, London, UK, 18–21 April 2016; p. 24. [Google Scholar]
- LeCun, Y.; Bengio, Y.; Hinton, G. Deep learning. Nature 2015, 521, 436. [Google Scholar] [CrossRef] [PubMed]
- Chakradhar, S.; Sankaradas, M.; Jakkula, V.; Cadambi, S. A dynamically configurable coprocessor for convolutional neural networks. ACM SIGARCH Comput. Archit. News 2010, 38, 247–257. [Google Scholar] [CrossRef]
- Dey, S.; Kalliatakis, G.; Saha, S.; Singh, A.K.; Ehsan, S.; McDonald-Maier, K. Mat-cnn-sopc: Motionless analysis of traffic using convolutional neural networks on system-on-a-programmable-chip. In Proceedings of the 2018 NASA/ESA Conference on Adaptive Hardware and Systems (AHS), Edinburgh, UK, 6–9 August 2018; pp. 291–298. [Google Scholar]
- Dey, S.; Singh, A.K.; Prasad, D.K.; Mcdonald-Maier, K.D. IRON-MAN: An Approach To Perform Temporal Motionless Analysis of Video using CNN in MPSoC. IEEE Access 2020, 8, 137101–137115. [Google Scholar] [CrossRef]
- Kalliatakis, G.; Ehsan, S.; Fasli, M.; Leonardis, A.; Gall, J.; McDonald-Maier, K.D. Detection of Human Rights Violations in Images: Can Convolutional Neural Networks help? In Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications-Volume 5: VISAPP, Porto, Portugal, 27 February–1 March 2017. [Google Scholar]
- Zhang, G.; Patuwo, B.E.; Hu, M.Y. Forecasting with artificial neural networks: The state of the art. Int. J. Forecast. 1998, 14, 35–62. [Google Scholar] [CrossRef]
- The 25 Worst Passwords of 2017. Available online: http://fortune.com/2017/12/19/the-25-most-used-hackable-passwords-2017-star-wars-freedom (accessed on 31 January 2018).
- The 25 Most Popular Passwords of 2018 Will Make You Feel Like a Security Genius. Available online: https://gizmodo.com/the-25-most-popular-passwords-of-2018-will-make-you-fee-1831052705 (accessed on 31 January 2018).
- Rijmen, V.; Daemen, J. Advanced Encryption Standard. Available online: https://csrc.nist.gov/publications/detail/fips/197/final (accessed on 25 May 2021).
- Odroid-XU4. Available online: https://goo.gl/KmHZRG (accessed on 23 July 2018).
- Pallipadi, V.; Starikovskiy, A. The Ondemand Governor. Available online: https://www.kernel.org/doc/ols/2006/ols2006v2-pages-223-238.pdf (accessed on 25 May 2021).
- He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 770–778. [Google Scholar]
- Selvaraju, R.R.; Cogswell, M.; Das, A.; Vedantam, R.; Parikh, D.; Batra, D. Grad-cam: Visual explanations from deep networks via gradient-based localization. In Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy, 22–29 October 2017; pp. 618–626. [Google Scholar]
- Krizhevsky, A.; Sutskever, I.; Hinton, G.E. Imagenet Classification With Deep Convolutional Neural Networks. Available online: https://papers.nips.cc/paper/2012/file/c399862d3b9d6b76c8436e924a68c45b-Paper.pdf (accessed on 25 May 2021).
- Pan, S.J.; Yang, Q. A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 2009, 22, 1345–1359. [Google Scholar] [CrossRef]
- Simonyan, K.; Zisserman, A. Very deep convolutional networks for large-scale image recognition. arXiv 2014, arXiv:1409.1556. [Google Scholar]
- Howard, A.G.; Zhu, M.; Chen, B.; Kalenichenko, D.; Wang, W.; Weyand, T.; Andreetto, M.; Adam, H. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv 2017, arXiv:1704.04861. [Google Scholar]
- Zoph, B.; Vasudevan, V.; Shlens, J.; Le, Q.V. Learning transferable architectures for scalable image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 18–23 June 2018; pp. 8697–8710. [Google Scholar]
- Exynos 5 Octa (5422). Available online: https://www.samsung.com/exynos (accessed on 23 July 2018).
- Lin, T.Y.; RoyChowdhury, A.; Maji, S. Bilinear cnn models for fine-grained visual recognition. In Proceedings of the IEEE International Conference on Computer Vision, Santiago, Chile, 7–13 December 2015; pp. 1449–1457. [Google Scholar]
- Bottou, L. Large-scale machine learning with stochastic gradient descent. In Proceedings of the COMPSTAT’2010, Paris, France, 22–27 August 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 177–186. [Google Scholar]
- LeCun, Y.; Boser, B.; Denker, J.S.; Henderson, D.; Howard, R.E.; Hubbard, W.; Jackel, L.D. Backpropagation applied to handwritten zip code recognition. Neural Comput. 1989, 1, 541–551. [Google Scholar] [CrossRef]
- Visa, S.; Ramsay, B.; Ralescu, A.L.; Van Der Knaap, E. Confusion Matrix-based Feature Selection. MAICS 2011, 710, 120–127. [Google Scholar]
- Iranfar, A.; Kamal, M.; Afzali-Kusha, A.; Pedram, M.; Atienza, D. Thespot: Thermal stress-aware power and temperature management for multiprocessor systems-on-chip. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2018, 37, 1532–1545. [Google Scholar] [CrossRef]
Size | Parameters | |
---|---|---|
ResNet152v2 | 232 MB | 60,380,648 |
NASNetMobile | 23 MB | 5,326,716 |
VGG19 | 549 MB | 143,667,240 |
MobileNetv2 | 14 MB | 3,538,984 |
ThermalAttackNet | 0.455 MB | 48,804 |
cons. | ond. | perf. | inter. | pow. | |
---|---|---|---|---|---|
ResNet152v2 | 45.88 | 46.88 | 65.63 | 29 | 41.63 |
NASNetMobile | 26.69 | 27.69 | 34.25 | 25.81 | 27.69 |
VGG19 | 25.44 | 26.19 | 26 | 24.63 | 26.19 |
MobileNetv2 | 55.63 | 66.06 | 69.69 | 42.56 | 52.75 |
ThermalAttackNet | 25 | 27 | 25.06 | 25.19 | 25.38 |
cons. | ond. | perf. | inter. | pow. | |
---|---|---|---|---|---|
ResNet152v2 | 25.99 | 31.999 | 31 | 25.499 | 25.499 |
NASNetMobile | 27.5 | 25.7499 | 31 | 29.2499 | 27.25 |
VGG19 | 27.75 | 31.4999 | 28.49999 | 25 | 25 |
MobileNetv2 | 30.75 | 25.4999 | 25.7499 | 24.5 | 24.75 |
ThermalAttackNet | 25.75 | 26 | 25 | 25 | 25 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dey, S.; Singh, A.K.; McDonald-Maier, K. ThermalAttackNet: Are CNNs Making It Easy to Perform Temperature Side-Channel Attack in Mobile Edge Devices? Future Internet 2021, 13, 146. https://doi.org/10.3390/fi13060146
Dey S, Singh AK, McDonald-Maier K. ThermalAttackNet: Are CNNs Making It Easy to Perform Temperature Side-Channel Attack in Mobile Edge Devices? Future Internet. 2021; 13(6):146. https://doi.org/10.3390/fi13060146
Chicago/Turabian StyleDey, Somdip, Amit Kumar Singh, and Klaus McDonald-Maier. 2021. "ThermalAttackNet: Are CNNs Making It Easy to Perform Temperature Side-Channel Attack in Mobile Edge Devices?" Future Internet 13, no. 6: 146. https://doi.org/10.3390/fi13060146
APA StyleDey, S., Singh, A. K., & McDonald-Maier, K. (2021). ThermalAttackNet: Are CNNs Making It Easy to Perform Temperature Side-Channel Attack in Mobile Edge Devices? Future Internet, 13(6), 146. https://doi.org/10.3390/fi13060146