Olsan Ozbay (Dept. ECE, University of Maryland), Yuntao Liu (ISR, University of Maryland), Ankur Srivastava (Dept. ECE, ISR, University of Maryland)

Electromagnetic (EM) side channel attacks (SCA) have been very powerful in extracting secret information from hardware systems. Existing attacks usually extract discrete values from the EM side channel, such as cryptographic key bits and operation types. In this work, we develop an EM SCA to extract continuous values that are being used in an averaging process, a common operation used in federated learning. A convolutional neural network (CNN) framework is constructed to analyze the collected EM data. Our results show that our attack is able to distinguish the distributions of the underlying data with up to 93% accuracy, indicating that applications previously considered as secure, such as federated learning, should be protected from EM side-channel attacks in their implementation.

View More Papers

VETEOS: Statically Vetting EOSIO Contracts for the “Groundhog Day”...

Levi Taiji Li (University of Utah), Ningyu He (Peking University), Haoyu Wang (Huazhong University of Science and Technology), Mu Zhang (University of Utah)

Read More

Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware

Ryan Pickren (Georgia Institute of Technology), Tohid Shekari (Georgia Institute of Technology), Saman Zonouz (Georgia Institute of Technology), Raheem Beyah (Georgia Institute of Technology)

Read More

DynPRE: Protocol Reverse Engineering via Dynamic Inference

Zhengxiong Luo (Tsinghua University), Kai Liang (Central South University), Yanyang Zhao (Tsinghua University), Feifan Wu (Tsinghua University), Junze Yu (Tsinghua University), Heyuan Shi (Central South University), Yu Jiang (Tsinghua University)

Read More