JOURNAL ARTICLE

Adversarial Black-Box Attacks with Timing Side-Channel Leakage

Tsunato NakaiDaisuke SuzukiFumio OmatsuTakeshi Fujino

Year: 2020 Journal:   IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences Vol: E104.A (1)Pages: 143-151   Publisher: Institute of Electronics, Information and Communication Engineers

Abstract

Artificial intelligence (AI), especially deep learning (DL), has been remarkable and applied to various industries. However, adversarial examples (AE), which add small perturbations to input data of deep neural networks (DNNs) for misclassification, are attracting attention. In this paper, we propose a novel black-box attack to craft AE using only processing time which is side-channel information of DNNs, without using training data, model architecture and parameters, substitute models or output probability. While, several existing black-box attacks use output probability, our attack exploits a relationship between the number of activated nodes and the processing time of DNNs. The perturbations for AE are decided by the differential processing time according to input data in our attack. We show experimental results in which our attack's AE increase the number of activated nodes and cause misclassification to one of the incorrect labels effectively. In addition, the experimental results highlight that our attack can evade gradient masking countermeasures which mask output probability to prevent crafting AE against several black-box attacks.

Keywords:
Computer science Black box Masking (illustration) Exploit Information leakage Adversarial system Deep neural networks Channel (broadcasting) Latency (audio) Artificial neural network Side channel attack Artificial intelligence Real-time computing Machine learning Computer security Computer network Telecommunications Cryptography

Metrics

2
Cited By
0.15
FWCI (Field Weighted Citation Impact)
22
Refs
0.58
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Adversarial Robustness in Machine Learning
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

BOOK-CHAPTER

Black-box adversarial attacks

Pin‐Yu ChenCho‐Jui Hsieh

Elsevier eBooks Year: 2022 Pages: 29-46
JOURNAL ARTICLE

Simple Black-box Adversarial Attacks

Chuan GuoJacob R. GardnerYurong YouAndrew Gordon WilsonKilian Q. Weinberger

Journal:   arXiv (Cornell University) Year: 2019 Pages: 2484-2493
BOOK-CHAPTER

Timing and Side Channel Attacks

Nezer ZaidenbergAmit Resh

International series on intelligent systems, control and automation: science and engineering Year: 2015 Pages: 183-194
© 2026 ScienceGate Book Chapters — All rights reserved.