Countermeasure against quantum hacking using detection statistics
- URL: http://arxiv.org/abs/2010.08474v1
- Date: Fri, 16 Oct 2020 16:19:50 GMT
- Title: Countermeasure against quantum hacking using detection statistics
- Authors: Ga\"etan Gras and Davide Rusca and Hugo Zbinden and F\'elix
Bussi\`eres
- Abstract summary: We present a new countermeasure against these kind of attacks based on the use of multi-pixel detectors.
We show that with this method, we are able to estimate an upper bound on the information an eavesdropper could have on the key exchanged.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Detector blinding attacks have been proposed in the last few years, and they
could potentially threaten the security of QKD systems. Even though no complete
QKD system has been hacked yet, it is nevertheless important to consider
countermeasures to avoid information leakage. In this paper, we present a new
countermeasure against these kind of attacks based on the use of multi-pixel
detectors. We show that with this method, we are able to estimate an upper
bound on the information an eavesdropper could have on the key exchanged.
Finally, we test a multi-pixel detector based on SNSPDs to show it can fulfill
all the requirement for our countermeasure to be effective.
Related papers
- Deep-learning-based continuous attacks on quantum key distribution protocols [0.0]
We design a new attack scheme that exploits continuous measurement together with the powerful pattern recognition capacities of deep recurrent neural networks.
We show that, when applied to the BB84 protocol, our attack can be difficult to notice while still allowing the spy to extract significant information about the states of the qubits sent in the quantum communication channel.
arXiv Detail & Related papers (2024-08-22T17:39:26Z) - AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning [93.77763753231338]
Adversarial Contrastive Prompt Tuning (ACPT) is proposed to fine-tune the CLIP image encoder to extract similar embeddings for any two intermediate adversarial queries.
We show that ACPT can detect 7 state-of-the-art query-based attacks with $>99%$ detection rate within 5 shots.
We also show that ACPT is robust to 3 types of adaptive attacks.
arXiv Detail & Related papers (2024-08-04T09:53:50Z) - The Adversarial Implications of Variable-Time Inference [47.44631666803983]
We present an approach that exploits a novel side channel in which the adversary simply measures the execution time of the algorithm used to post-process the predictions of the ML model under attack.
We investigate leakage from the non-maximum suppression (NMS) algorithm, which plays a crucial role in the operation of object detectors.
We demonstrate attacks against the YOLOv3 detector, leveraging the timing leakage to successfully evade object detection using adversarial examples, and perform dataset inference.
arXiv Detail & Related papers (2023-09-05T11:53:17Z) - State-Blocking Side-Channel Attacks and Autonomous Fault Detection in Quantum Key Distribution [0.0]
Side-channel attacks allow an Eavesdropper to use insecurities in the practical implementation of QKD systems.
We discuss a scheme to autonomously detect such an attack during an ongoing QKD session.
We present how Alice and Bob can put in place a countermeasure to continue use of the QKD system, once a detection is made.
arXiv Detail & Related papers (2023-05-29T10:43:57Z) - Mate! Are You Really Aware? An Explainability-Guided Testing Framework
for Robustness of Malware Detectors [49.34155921877441]
We propose an explainability-guided and model-agnostic testing framework for robustness of malware detectors.
We then use this framework to test several state-of-the-art malware detectors' abilities to detect manipulated malware.
Our findings shed light on the limitations of current malware detectors, as well as how they can be improved.
arXiv Detail & Related papers (2021-11-19T08:02:38Z) - Foiling zero-error attacks against coherent-one-way quantum key
distribution [0.0]
coherent-one-way (COW) QKD is commercially available.
It has been shown very recently that its secret key rate scales quadratically with the channel transmittance.
We study various countermeasures to foil zero-error attacks against COW-QKD.
arXiv Detail & Related papers (2021-08-27T17:01:14Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - A generalized efficiency mismatch attack to bypass detection-scrambling
countermeasure [0.0]
We show that the proposed countermeasure can be bypassed if the attack is generalized by including more attack variables.
Our result and methodology could be used to security-certify a free-space quantum communication receiver against all types of detector-efficiency-mismatch type attacks.
arXiv Detail & Related papers (2021-01-07T05:02:24Z) - Weight Poisoning Attacks on Pre-trained Models [103.19413805873585]
We show that it is possible to construct weight poisoning'' attacks where pre-trained weights are injected with vulnerabilities that expose backdoors'' after fine-tuning.
Our experiments on sentiment classification, toxicity detection, and spam detection show that this attack is widely applicable and poses a serious threat.
arXiv Detail & Related papers (2020-04-14T16:51:42Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Hacking single-photon avalanche detector in quantum key distribution via
pulse illumination [6.285329211368446]
We show an adversary's capability of exploiting the imperfection of the patch itself to bypass the patch.
We also analyze the secret key rate under the pulse illumination attack, which theoretically confirmed that Eve can conduct the attack to learn the secret key.
arXiv Detail & Related papers (2020-02-21T06:05:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.