JOURNAL ARTICLE

Extracting Proxy Models from Side-Channel Insights to Enhance Adversarial Attacks on Black-Box DNNs

Abstract

Side-channel information leakage can be exploited to reverse engineer critical architectural details of a target DNN model executing on a hardware accelerator. However, using these details to apply a practical adversarial attack remains a significant challenge. In this paper, we first introduce a novel approach to analyze side-channel data and extract detailed architectural information of DNN models, including accurate prediction of layer hyperparameters and inter-layer skip connections. Next, we develop techniques to construct effective proxy models from this information. We then leverage white-box access to these proxies to generate adversarial examples capable of effectively deceiving the target DNN model. We illustrate our techniques using popular DNNs as target models, and demonstrate that the constructed proxy models achieve up to 89.8% similarity in performance compared to the target models. Furthermore, we achieve adversarial transferability rates of up to 72.34% and induce up to 60.4% drop in accuracy in the target models using the crafted adversarial images. Compared to off-the-shelf substitute models, our method improves transferability by as much as 30% in untargeted adversarial attacks. Even when the target model is protected by a state-of-the-art denoiser, our proxy models generate 5.5% more transferable adversarial examples compared to other substitute models in untargeted adversarial attacks.

Keywords:
Proxy (statistics) Adversarial system Black box Computer science Side channel attack Channel (broadcasting) Computer security Computer network Cryptography Artificial intelligence Machine learning

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
26
Refs
0.11
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Adversarial Robustness in Machine Learning
Physical Sciences →  Computer Science →  Artificial Intelligence
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Adversarial Black-Box Attacks with Timing Side-Channel Leakage

Tsunato NakaiDaisuke SuzukiFumio OmatsuTakeshi Fujino

Journal:   IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences Year: 2020 Vol: E104.A (1)Pages: 143-151
JOURNAL ARTICLE

Practical No-box Adversarial Attacks against DNNs

Qizhang LiYiwen GuoHao Chen

Journal:   arXiv (Cornell University) Year: 2020 Vol: 33 Pages: 12849-12860
BOOK-CHAPTER

Black-box adversarial attacks

Pin‐Yu ChenCho‐Jui Hsieh

Elsevier eBooks Year: 2022 Pages: 29-46
JOURNAL ARTICLE

Black-Box Adversarial Attacks against Audio Forensics Models

Yi JiangDengpan Ye

Journal:   Security and Communication Networks Year: 2022 Vol: 2022 Pages: 1-8
© 2026 ScienceGate Book Chapters — All rights reserved.