2021
DOI: 10.48550/arxiv.2112.04947
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Automated Side Channel Analysis of Media Software with Manifold Learning

Abstract: The prosperous development of cloud computing and machine learning as a service has led to the widespread use of media software to process confidential media data. This paper explores an adversary's ability to launch side channel analyses (SCA) against media software to reconstruct confidential media inputs. Recent advances in representation learning and perceptual learning inspired us to consider the reconstruction of media inputs from side channel traces as a cross-modality manifold learning task that can be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 63 publications
0
2
0
Order By: Relevance
“…Li et al [59] demonstrated a neural network to perform power analysis attacks automatically. Yuan et al [116] demonstrated that manifold learning can be used to detect and locate side-channel leakage in media software.…”
Section: E Automated Discovery Of Side Channel Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Li et al [59] demonstrated a neural network to perform power analysis attacks automatically. Yuan et al [116] demonstrated that manifold learning can be used to detect and locate side-channel leakage in media software.…”
Section: E Automated Discovery Of Side Channel Attacksmentioning
confidence: 99%
“…Most of these works focus on cryptographic implementations and aim for the goal of making the code constant-time [19], [79], [63], [13]. More recently, Yuan et al [116] showed that manifold learning can be used for automated side-channel analysis of media software. For common applications processing sensitive input, e.g., browsers, the situation is less clear, as it is not feasible to linearize and unify the entire instruction stream for different user inputs that trigger vastly different program behavior.…”
Section: Introductionmentioning
confidence: 99%