Tata Institute of Fundamental Research

Wait ... even my phone charger can steal my data?

STCS Seminar
Speaker: Purushottam Kar (IIT Kanpur)
Organiser: Raghuvansh Saxena
Date: Tuesday, 20 Aug 2024, 16:00 to 17:00
Venue: via Zoom in A201

(Scan to add to calendar)
Abstract: 

In the context of cybersecurity, a side-channel attack operates by targeting the implementation of an algorithm or protocol rather than identifying flaws in the algorithm or protocol itself. We explore a family of such attacks, utilizing the electromagnetic (EM) or power channels to perform exfiltration i.e., steal data from a device. Specifically, we study the exfiltration of AI/ML models operating inside a device using a limited number of "probes". Our path to this nefarious goal takes us through the seemingly unrelated problem of how permutations induced by the quotient groups Z/NZ and (Z/NZ)^x act upon the Hamming topology. We arrive at novel results in this direction that allow disturbingly efficient attacks using a small number of probes. These attacks target simple arithmetic operations such as addition or multiplication carried out while an AI/ML model is performing inference. The talk will present a short guided tour of this study and conclude with some fascinating yet open questions thereby surfaced.

Short Bio:

Roop is a member of the IIT Kanpur faculty. He finds the IITK campus so nice that he graduated from it twice. He is fascinated by machine learning and optimization and has thus far managed to convince his employers that he understands these areas decently. Consequently, they let him stick around while he explores ways to use ML to achieve clean-air objectives, assist in teaching comically large class sizes, reveal and mitigate cybersecurity threats, and make rich corporations even richer.