ASCENT: Amplifying Power Side-Channel Resilience via Learning &   Monte-Carlo Tree Search
        - URL: http://arxiv.org/abs/2406.19549v2
 - Date: Mon, 1 Jul 2024 04:52:56 GMT
 - Title: ASCENT: Amplifying Power Side-Channel Resilience via Learning &   Monte-Carlo Tree Search
 - Authors: Jitendra Bhandari, Animesh Basak Chowdhury, Mohammed Nabeel, Ozgur Sinanoglu, Siddharth Garg, Ramesh Karri, Johann Knechtel, 
 - Abstract summary: Power side-channel (PSC) analysis is pivotal for securing cryptographic hardware.
Prior art focused on securing gate-level netlists obtained as-is from chip design automation.
We propose a "security-first" approach, refining the logic stage to enhance the overall resilience of PSC countermeasures.
 - Score: 19.22091270437206
 - License: http://creativecommons.org/licenses/by/4.0/
 - Abstract:   Power side-channel (PSC) analysis is pivotal for securing cryptographic hardware. Prior art focused on securing gate-level netlists obtained as-is from chip design automation, neglecting all the complexities and potential side-effects for security arising from the design automation process. That is, automation traditionally prioritizes power, performance, and area (PPA), sidelining security. We propose a "security-first" approach, refining the logic synthesis stage to enhance the overall resilience of PSC countermeasures. We introduce ASCENT, a learning-and-search-based framework that (i) drastically reduces the time for post-design PSC evaluation and (ii) explores the security-vs-PPA design space. Thus, ASCENT enables an efficient exploration of a large number of candidate netlists, leading to an improvement in PSC resilience compared to regular PPA-optimized netlists. ASCENT is up to 120x faster than traditional PSC analysis and yields a 3.11x improvement for PSC resilience of state-of-the-art PSC countermeasures 
 
       
      
        Related papers
        - Thought Purity: Defense Paradigm For Chain-of-Thought Attack [14.92561128881555]
We propose Thought Purity, a defense paradigm that strengthens resistance to malicious content while preserving operational efficacy.<n>Our approach establishes the first comprehensive defense mechanism against CoTA vulnerabilities in reinforcement learning-aligned reasoning systems.
arXiv  Detail & Related papers  (2025-07-16T15:09:13Z) - ShadowBinding: Realizing Effective Microarchitectures for In-Core Secure   Speculation Schemes [1.359473465752453]
We present effective microarchitectures for two state-of-the-art secure schemes.
We find that the IPC impact of in-core secure schemes is higher than previously estimated.
arXiv  Detail & Related papers  (2025-04-09T16:33:42Z) - Byzantine-Resilient Over-the-Air Federated Learning under Zero-Trust   Architecture [68.83934802584899]
We propose a novel Byzantine-robust FL paradigm for over-the-air transmissions, referred to as federated learning with secure adaptive clustering (FedSAC)
FedSAC aims to protect a portion of the devices from attacks through zero trust architecture (ZTA) based Byzantine identification and adaptive device clustering.
 Numerical results substantiate the superiority of the proposed FedSAC over existing methods in terms of both test accuracy and convergence rate.
arXiv  Detail & Related papers  (2025-03-24T01:56:30Z) - Performance Analysis and Industry Deployment of Post-Quantum   Cryptography Algorithms [0.8602553195689513]
The National Institute of Standards and Technology (NIST) has selected CRYSTALS-Kyber and CRYSTALS-Dilithium as standardized PQC algorithms for secure key exchange and digital signatures.
This study conducts a comprehensive performance analysis of these algorithms by benchmarking execution times across cryptographic operations.
Our findings demonstrate that Kyber and Dilithium achieve efficient execution times, outperforming classical cryptographic schemes such as RSA and ECDSA at equivalent security levels.
arXiv  Detail & Related papers  (2025-03-17T09:06:03Z) - Enhancing Transportation Cyber-Physical Systems Security: A Shift to   Post-Quantum Cryptography [6.676253819673155]
The rise of quantum computing threatens traditional cryptographic algorithms that secure Transportation Cyber-Physical Systems ( TCPS)
The objective of this paper is to underscore the urgency of transitioning to post-quantum cryptography (PQC) to mitigate these risks.
We analyzed vulnerabilities in traditional cryptography against quantum attacks and reviewed the applicability of NIST-standardized PQC schemes in TCPS.
arXiv  Detail & Related papers  (2024-11-20T04:11:33Z) - Benchmarking End-To-End Performance of AI-Based Chip Placement   Algorithms [77.71341200638416]
ChiPBench is a benchmark designed to evaluate the effectiveness of AI-based chip placement algorithms.
We have gathered 20 circuits from various domains (e.g., CPU, GPU, and microcontrollers) for evaluation.
Results show that even if intermediate metric of a single-point algorithm is dominant, the final PPA results are unsatisfactory.
arXiv  Detail & Related papers  (2024-07-03T03:29:23Z) - Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated   AI-enabled Critical Infrastructure [42.688679691088204]
We propose a leakage-resilient, communication-efficient, and carbon-neutral approach for ACI networks.
We show that CDPA can reduce communication cost by half while preserving model utility.
We highlight existing benchmarks that generate 2.6x to over 100x more carbon emissions than CDPA.
arXiv  Detail & Related papers  (2024-05-24T06:35:09Z) - The Pitfalls and Promise of Conformal Inference Under Adversarial   Attacks [90.52808174102157]
In safety-critical applications such as medical imaging and autonomous driving, it is imperative to maintain both high adversarial robustness to protect against potential adversarial attacks.
A notable knowledge gap remains concerning the uncertainty inherent in adversarially trained models.
This study investigates the uncertainty of deep learning models by examining the performance of conformal prediction (CP) in the context of standard adversarial attacks.
arXiv  Detail & Related papers  (2024-05-14T18:05:19Z) - Multi-Agent Optimization for Safety Analysis of Cyber-Physical Systems:   Position Paper [0.8562182926816566]
Failure Mode, Effects and Criticality Analysis (FMECA) is one of the safety analysis methods recommended by most of the international standards.
We describe a multi-agent based optimization method which extends classical FMECA for offering optimal solutions.
arXiv  Detail & Related papers  (2024-03-25T16:14:45Z) - SCARF: Securing Chips with a Robust Framework against Fabrication-time   Hardware Trojans [1.8980236415886387]
Hardware Trojans (HTs) can be introduced during IC fabrication.
We propose a comprehensive approach to enhance IC security from front-end to back-end stages of design.
arXiv  Detail & Related papers  (2024-02-19T14:18:08Z) - Evaluating Model-free Reinforcement Learning toward Safety-critical
  Tasks [70.76757529955577]
This paper revisits prior work in this scope from the perspective of state-wise safe RL.
We propose Unrolling Safety Layer (USL), a joint method that combines safety optimization and safety projection.
To facilitate further research in this area, we reproduce related algorithms in a unified pipeline and incorporate them into SafeRL-Kit.
arXiv  Detail & Related papers  (2022-12-12T06:30:17Z) - Distributed Reinforcement Learning for Privacy-Preserving Dynamic Edge
  Caching [91.50631418179331]
A privacy-preserving distributed deep policy gradient (P2D3PG) is proposed to maximize the cache hit rates of devices in the MEC networks.
We convert the distributed optimizations into model-free Markov decision process problems and then introduce a privacy-preserving federated learning method for popularity prediction.
arXiv  Detail & Related papers  (2021-10-20T02:48:27Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv  Detail & Related papers  (2021-06-03T16:45:40Z) - Constraints Satisfiability Driven Reinforcement Learning for Autonomous
  Cyber Defense [7.321728608775741]
We present a new hybrid autonomous agent architecture that aims to optimize and verify defense policies of reinforcement learning (RL)
We use constraints verification (using satisfiability modulo theory (SMT)) to steer the RL decision-making toward safe and effective actions.
Our evaluation of the presented approach in a simulated CPS environment shows that the agent learns the optimal policy fast and defeats diversified attack strategies in 99% cases.
arXiv  Detail & Related papers  (2021-04-19T01:08:30Z) - Improved Mask-CTC for Non-Autoregressive End-to-End ASR [49.192579824582694]
Recently proposed end-to-end ASR system based on mask-predict with connectionist temporal classification (CTC)
We propose to enhance the network architecture by employing a recently proposed architecture called Conformer.
Next, we propose new training and decoding methods by introducing auxiliary objective to predict the length of a partial target sequence.
arXiv  Detail & Related papers  (2020-10-26T01:22:35Z) 
        This list is automatically generated from the titles and abstracts of the papers in this site.
       
     
           This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.