Automated verification of countermeasure against detector-control attack
in quantum key distribution
- URL: http://arxiv.org/abs/2305.18610v1
- Date: Mon, 29 May 2023 21:08:08 GMT
- Title: Automated verification of countermeasure against detector-control attack
in quantum key distribution
- Authors: Polina Acheva, Konstantin Zaitsev, Vladimir Zavodilenko, Anton Losev,
Anqi Huang, Vadim Makarov
- Abstract summary: Attacks that control single-photon detectors in quantum key distribution are capable of eavesdropping the secret key.
We report an automated testbench that checks the detector's vulnerabilities against these attacks.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Attacks that control single-photon detectors in quantum key distribution
using tailored bright illumination are capable of eavesdropping the secret key.
Here we report an automated testbench that checks the detector's
vulnerabilities against these attacks. We illustrate its performance by testing
a free-running detector that includes a rudimentary countermeasure measuring an
average photocurrent. While our testbench automatically finds the detector to
be controllable in a continuous-blinding regime, the countermeasure registers
photocurrent significantly exceeding that in a quantum regime, thus revealing
the attack. We then perform manually a pulsed blinding attack, which controls
the detector intermittently. This attack is missed by the countermeasure in a
wide range of blinding pulse durations and powers, still allowing to eavesdrop
the key. We make recommendations for improvement of both the testbench and
countermeasure.
Related papers
- AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning [93.77763753231338]
Adversarial Contrastive Prompt Tuning (ACPT) is proposed to fine-tune the CLIP image encoder to extract similar embeddings for any two intermediate adversarial queries.
We show that ACPT can detect 7 state-of-the-art query-based attacks with $>99%$ detection rate within 5 shots.
We also show that ACPT is robust to 3 types of adaptive attacks.
arXiv Detail & Related papers (2024-08-04T09:53:50Z) - Stumbling Blocks: Stress Testing the Robustness of Machine-Generated
Text Detectors Under Attacks [48.32116554279759]
We study the robustness of popular machine-generated text detectors under attacks from diverse categories: editing, paraphrasing, prompting, and co-generating.
Our attacks assume limited access to the generator LLMs, and we compare the performance of detectors on different attacks under different budget levels.
Averaging all detectors, the performance drops by 35% across all attacks.
arXiv Detail & Related papers (2024-02-18T16:36:00Z) - Confidence-driven Sampling for Backdoor Attacks [49.72680157684523]
Backdoor attacks aim to surreptitiously insert malicious triggers into DNN models, granting unauthorized control during testing scenarios.
Existing methods lack robustness against defense strategies and predominantly focus on enhancing trigger stealthiness while randomly selecting poisoned samples.
We introduce a straightforward yet highly effective sampling methodology that leverages confidence scores. Specifically, it selects samples with lower confidence scores, significantly increasing the challenge for defenders in identifying and countering these attacks.
arXiv Detail & Related papers (2023-10-08T18:57:36Z) - Illusory Attacks: Information-Theoretic Detectability Matters in Adversarial Attacks [76.35478518372692]
We introduce epsilon-illusory, a novel form of adversarial attack on sequential decision-makers.
Compared to existing attacks, we empirically find epsilon-illusory to be significantly harder to detect with automated methods.
Our findings suggest the need for better anomaly detectors, as well as effective hardware- and system-level defenses.
arXiv Detail & Related papers (2022-07-20T19:49:09Z) - Countering detector manipulation attacks in quantum communication
through detector self-testing [0.0]
A vulnerability in single-photon detectors to blinding attacks has been one of the biggest concerns.
We present a countermeasure based on self-testing of detectors to confirm their intended operation.
arXiv Detail & Related papers (2022-04-13T03:36:54Z) - Mate! Are You Really Aware? An Explainability-Guided Testing Framework
for Robustness of Malware Detectors [49.34155921877441]
We propose an explainability-guided and model-agnostic testing framework for robustness of malware detectors.
We then use this framework to test several state-of-the-art malware detectors' abilities to detect manipulated malware.
Our findings shed light on the limitations of current malware detectors, as well as how they can be improved.
arXiv Detail & Related papers (2021-11-19T08:02:38Z) - Adversarial Attacks and Mitigation for Anomaly Detectors of
Cyber-Physical Systems [6.417955560857806]
In this work, we present an adversarial attack that simultaneously evades the anomaly detectors and rule checkers of a CPS.
Inspired by existing gradient-based approaches, our adversarial attack crafts noise over the sensor and actuator values, then uses a genetic algorithm to optimise the latter.
We implement our approach for two real-world critical infrastructure testbeds, successfully reducing the classification accuracy of their detectors by over 50% on average.
arXiv Detail & Related papers (2021-05-22T12:19:03Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Detector blinding attacks on counterfactual quantum key distribution [0.0]
Counterfactual quantum key distribution protocols allow two sides to establish a common secret key.
Part of the quantum state used to establish each bit never leaves the transmitting side, which hinders some attacks.
We present two attacks that use this ability to compromise the security of counterfactual quantum key distribution.
arXiv Detail & Related papers (2020-11-05T07:41:39Z) - Security proof of practical quantum key distribution with
detection-efficiency mismatch [3.1988884923120313]
We develop a method that allows to provide security proofs without the usual assumption.
Our method can take the detection-efficiency mismatch into account without having to restrict the attack strategy of the adversary.
Our method also shows that in the absence of efficiency mismatch in our detector model, the key rate increases if the loss due to detection inefficiency is assumed to be outside of the adversary's control.
arXiv Detail & Related papers (2020-04-09T06:49:29Z) - Hacking single-photon avalanche detector in quantum key distribution via
pulse illumination [6.285329211368446]
We show an adversary's capability of exploiting the imperfection of the patch itself to bypass the patch.
We also analyze the secret key rate under the pulse illumination attack, which theoretically confirmed that Eve can conduct the attack to learn the secret key.
arXiv Detail & Related papers (2020-02-21T06:05:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.