I know what you trained last summer: A survey on stealing machine learning models and defences

D Oliynyk, R Mayer, A Rauber - ACM Computing Surveys, 2023 - dl.acm.org
Machine-Learning-as-a-Service (MLaaS) has become a widespread paradigm, making
even the most complex Machine Learning models available for clients via, eg, a pay-per …

High accuracy and high fidelity extraction of neural networks

M Jagielski, N Carlini, D Berthelot, A Kurakin… - 29th USENIX security …, 2020 - usenix.org
In a model extraction attack, an adversary steals a copy of a remotely deployed machine
learning model, given oracle prediction access. We taxonomize model extraction attacks …

Unraveling Attacks to Machine Learning-Based IoT Systems: A Survey and the Open Libraries Behind Them

C Liu, B Chen, W Shao, C Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The advent of the Internet of Things (IoT) has brought forth an era of unprecedented
connectivity, with an estimated 80 billion smart devices expected to be in operation by the …

Privacy side channels in machine learning systems

E Debenedetti, G Severi, N Carlini… - 33rd USENIX Security …, 2024 - usenix.org
Most current approaches for protecting privacy in machine learning (ML) assume that
models exist in a vacuum. Yet, in reality, these models are part of larger systems that include …

Cache telepathy: Leveraging shared resource attacks to learn {DNN} architectures

M Yan, CW Fletcher, J Torrellas - 29th USENIX Security Symposium …, 2020 - usenix.org
Deep Neural Networks (DNNs) are fast becoming ubiquitous for their ability to attain good
accuracy in various machine learning tasks. A DNN's architecture (ie, its hyperparameters) …

Stealing neural networks via timing side channels

V Duddu, D Samanta, DV Rao, VE Balas - arXiv preprint arXiv:1812.11720, 2018 - arxiv.org
Deep learning is gaining importance in many applications. However, Neural Networks face
several security and privacy threats. This is particularly significant in the scenario where …

Deepem: Deep neural networks model recovery through em side-channel information leakage

H Yu, H Ma, K Yang, Y Zhao… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Neural Network (NN) accelerators are currently widely deployed in various security-crucial
scenarios, including image recognition, natural language processing and autonomous …

Leaky dnn: Stealing deep-learning model secret with gpu context-switching side-channel

J Wei, Y Zhang, Z Zhou, Z Li… - 2020 50th Annual IEEE …, 2020 - ieeexplore.ieee.org
Machine learning has been attracting strong interests in recent years. Numerous companies
have invested great efforts and resources to develop customized deep-learning models …

Stealing neural network structure through remote FPGA side-channel analysis

Y Zhang, R Yasaei, H Chen, Z Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Deep Neural Network (DNN) models have been extensively developed by companies for a
wide range of applications. The development of a customized DNN model with great …

Generating robust dnn with resistance to bit-flip based adversarial weight attack

L Liu, Y Guo, Y Cheng, Y Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Rowhammer Attack, a new DRAM-based attack, was developed exploiting weak cells to
alter their content. Such attacks can be launched at the user level without requiring access …