A survey on hardware security of DNN models and accelerators
As “deep neural networks”(DNNs) achieve increasing accuracy, they are getting employed
in increasingly diverse applications, including security-critical applications such as medical …
in increasingly diverse applications, including security-critical applications such as medical …
Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead
Currently, machine learning (ML) techniques are at the heart of smart cyber-physical
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …
BoMaNet: Boolean masking of an entire neural network
Recent work on stealing machine learning (ML) models from inference engines with
physical side-channel attacks warrant an urgent need for effective side-channel defenses …
physical side-channel attacks warrant an urgent need for effective side-channel defenses …
Preventing DNN model IP theft via hardware obfuscation
Training accurate deep learning (DL) models require large amounts of training data,
significant work in labeling the data, considerable computing resources, and substantial …
significant work in labeling the data, considerable computing resources, and substantial …
Guarding machine learning hardware against physical side-channel attacks
Machine learning (ML) models can be trade secrets due to their development cost. Hence,
they need protection against malicious forms of reverse engineering (eg, in IP piracy). With a …
they need protection against malicious forms of reverse engineering (eg, in IP piracy). With a …
Survey of attacks and defenses on edge-deployed neural networks
Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge
devices, for latency, privacy, or energy reasons. While datacenter networks can be protected …
devices, for latency, privacy, or energy reasons. While datacenter networks can be protected …
Two sides of the same coin: Boons and banes of machine learning in hardware security
The last decade has witnessed remarkable research advances at the intersection of
machine learning (ML) and hardware security. The confluence of the two technologies has …
machine learning (ML) and hardware security. The confluence of the two technologies has …
Dynamic deep neural network adversarial attacks for edge-based iot devices
M Ayyat, SK Nukavarapu… - GLOBECOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Edge-based IoT devices have experienced phenomenal growth in recent years due to
rapidly increasing demand in various emerging applications which typically utilize machine …
rapidly increasing demand in various emerging applications which typically utilize machine …
Revealing CNN architectures via side-channel analysis in dataflow-based inference accelerators
Convolutional Neural Networks (CNNs) are widely used in various domains, including
image recognition, medical diagnosis and autonomous driving. Recent advances in …
image recognition, medical diagnosis and autonomous driving. Recent advances in …
Timing black-box attacks: Crafting adversarial examples through timing leaks against dnns on embedded devices
T Nakai, D Suzuki, T Fu**o - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Deep neural networks (DNNs) have been applied to various industries. In particular, DNNs
on embedded devices have attracted considerable interest because they allow real-time …
on embedded devices have attracted considerable interest because they allow real-time …