Deeptheft: Stealing dnn model architectures through power side channel
Deep Neural Network (DNN) models are often deployed in resource-sharing clouds as
Machine Learning as a Service (MLaaS) to provide inference services. To steal model …
Machine Learning as a Service (MLaaS) to provide inference services. To steal model …
Learning privacy-preserving graph convolutional network with partially observed sensitive attributes
Recent studies have shown Graph Neural Networks (GNNs) are extremely vulnerable to
attribute inference attacks. To tackle this challenge, existing privacy-preserving GNNs …
attribute inference attacks. To tackle this challenge, existing privacy-preserving GNNs …
Reverse engineering neural network folding with remote FPGA power analysis
Specialized hardware accelerators in the form of FPGAs are widely being used for neural
network implementations. By that, they also become the target of power analysis attacks that …
network implementations. By that, they also become the target of power analysis attacks that …
[PDF][PDF] SoK: neural network extraction through physical side channels
SoK Neural Network Extraction-USENIX Presentation Page 1 SoK: Neural Network Extraction
Through Physical Side Channels 15.08.2024 Péter Horváth, Dirk Lauret, Zhuoran Liu, and …
Through Physical Side Channels 15.08.2024 Péter Horváth, Dirk Lauret, Zhuoran Liu, and …
SoK: Model Reverse Engineering Threats for Neural Network Hardware
S Potluri, F Koushanfar - Cryptology ePrint Archive, 2024 - eprint.iacr.org
There has been significant progress over the past seven years in model reverse engineering
(RE) for neural network (NN) hardware. Although there has been systematization of …
(RE) for neural network (NN) hardware. Although there has been systematization of …
Dual-Rail Precharge Logic-Based Side-Channel Countermeasure for DNN Systolic Array
L Wu, L Wu, X Zhang, M Chinbat - IEEE Transactions on Very …, 2024 - ieeexplore.ieee.org
Deep neural network (DNN) accelerators are widely used in cloud-edge-end and other
application scenarios. Researchers recently focused on extracting secret information from …
application scenarios. Researchers recently focused on extracting secret information from …
Transition Recovery Attack on Embedded State Machines Using Power Analysis
Modern embedded systems are ever present within our daily lives. Such devices remain
vulnerable to Differential Power Analysis via side-channel attacks, which provide a powerful …
vulnerable to Differential Power Analysis via side-channel attacks, which provide a powerful …
TP-NET: Training Privacy-Preserving Deep Neural Networks under Side-Channel Power Attacks
H Hu, J Gegax-Randazzo, C Carper… - … Symposium on Smart …, 2022 - ieeexplore.ieee.org
Privacy in deep learning is receiving tremendous attention with its wide applications in
industry and academics. Recent studies have shown the internal structure of a deep neural …
industry and academics. Recent studies have shown the internal structure of a deep neural …
Power Analysis Side-Channel Attacks on Same and Cross-Device Settings: A Survey of Machine Learning Techniques
Abstract Systems that use secret keys or personal details are seriously at risk from side-
channel attacks, especially if they rely on power analysis. Attackers can use unintentional …
channel attacks, especially if they rely on power analysis. Attackers can use unintentional …
Hardware Trojan Key-Corruption Detection with Automated Neural Architecture Search
F Mezzarapa, J Goodrich, A Robins… - IFIP International Internet …, 2024 - Springer
This work presents a model hardware trojan which intermittently is capable of corrupting an
encryption operation occurring on a device. It asks whether this trojan can be detected via …
encryption operation occurring on a device. It asks whether this trojan can be detected via …