A survey on hardware security of DNN models and accelerators

S Mittal, H Gupta, S Srivastava - Journal of Systems Architecture, 2021 - Elsevier
As “deep neural networks”(DNNs) achieve increasing accuracy, they are getting employed
in increasingly diverse applications, including security-critical applications such as medical …

Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead

M Shafique, M Naseer, T Theocharides… - IEEE Design & …, 2020 - ieeexplore.ieee.org
Currently, machine learning (ML) techniques are at the heart of smart cyber-physical
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …

BoMaNet: Boolean masking of an entire neural network

A Dubey, R Cammarota, A Aysu - Proceedings of the 39th International …, 2020 - dl.acm.org
Recent work on stealing machine learning (ML) models from inference engines with
physical side-channel attacks warrant an urgent need for effective side-channel defenses …

Preventing DNN model IP theft via hardware obfuscation

BF Goldstein, VC Patil, VC Ferreira… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
Training accurate deep learning (DL) models require large amounts of training data,
significant work in labeling the data, considerable computing resources, and substantial …

Guarding machine learning hardware against physical side-channel attacks

A Dubey, R Cammarota, V Suresh, A Aysu - ACM Journal on Emerging …, 2022 - dl.acm.org
Machine learning (ML) models can be trade secrets due to their development cost. Hence,
they need protection against malicious forms of reverse engineering (eg, in IP piracy). With a …

Survey of attacks and defenses on edge-deployed neural networks

M Isakov, V Gadepally, KM Gettings… - 2019 IEEE High …, 2019 - ieeexplore.ieee.org
Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge
devices, for latency, privacy, or energy reasons. While datacenter networks can be protected …

Two sides of the same coin: Boons and banes of machine learning in hardware security

W Liu, CH Chang, X Wang, C Liu… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
The last decade has witnessed remarkable research advances at the intersection of
machine learning (ML) and hardware security. The confluence of the two technologies has …

Dynamic deep neural network adversarial attacks for edge-based iot devices

M Ayyat, SK Nukavarapu… - GLOBECOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Edge-based IoT devices have experienced phenomenal growth in recent years due to
rapidly increasing demand in various emerging applications which typically utilize machine …

Revealing CNN architectures via side-channel analysis in dataflow-based inference accelerators

H Weerasena, P Mishra - ACM Transactions on Embedded Computing …, 2024 - dl.acm.org
Convolutional Neural Networks (CNNs) are widely used in various domains, including
image recognition, medical diagnosis and autonomous driving. Recent advances in …

Timing black-box attacks: Crafting adversarial examples through timing leaks against dnns on embedded devices

T Nakai, D Suzuki, T Fu**o - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Deep neural networks (DNNs) have been applied to various industries. In particular, DNNs
on embedded devices have attracted considerable interest because they allow real-time …