A survey on hardware security of DNN models and accelerators

S Mittal, H Gupta, S Srivastava - Journal of Systems Architecture, 2021 - Elsevier
As “deep neural networks”(DNNs) achieve increasing accuracy, they are getting employed
in increasingly diverse applications, including security-critical applications such as medical …

Microarchitectural attacks in heterogeneous systems: A survey

H Naghibijouybari, EM Koruyeh… - ACM Computing …, 2022 - dl.acm.org
With the increasing proliferation of hardware accelerators and the predicted continued
increase in the heterogeneity of future computing systems, it is necessary to understand the …

Spy in the gpu-box: Covert and side channel attacks on multi-gpu systems

SB Dutta, H Naghibijouybari, A Gupta… - Proceedings of the 50th …, 2023 - dl.acm.org
The deep learning revolution has been enabled in large part by GPUs, and more recently
accelerators, which make it possible to carry out computationally demanding training and …

Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models

M Zhou, X Gao, P Liu, J Grundy, C Chen… - Proceedings of the 33rd …, 2024 - dl.acm.org
Recent studies show that on-device deployed deep learning (DL) models, such as those of
Tensor Flow Lite (TFLite), can be easily extracted from real-world applications and devices …

Neurobfuscator: A full-stack obfuscation tool to mitigate neural architecture stealing

J Li, Z He, AS Rakin, D Fan… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Neural network stealing attacks have posed grave threats to neural network model
deployment. Such attacks can be launched by extracting neural architecture information …

Dynamo: Protecting mobile dl models through coupling obfuscated dl operators

M Zhou, X Gao, X Chen, C Chen, J Grundy… - Proceedings of the 39th …, 2024 - dl.acm.org
Deploying deep learning (DL) models on mobile applications (Apps) has become ever-more
popular. However, existing studies show attackers can easily reverse-engineer mobile DL …

Layer sequence extraction of optimized dnns using side-channel information leaks

Y Sun, G Jiang, X Liu, P He… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Deep neural network (DNN) intellectual property (IP) models must be kept undisclosed to
avoid revealing trade secrets. Recent works have devised machine learning techniques that …

[PDF][PDF] A Security Framework for Improving QoS by Detecting and Mitigating Cache Side-Channel Attacks in Virtualized Environments

S Mahipal, VC Sharmila - IAENG Int J Comput Sci, 2023 - iaeng.org
Virtualization technology makes cloud resources affordable. Virtual Machines (VMs) are
widely used on top of host machines in cloud computing environments. Adversaries target …

Ezclone: Improving dnn model extraction attack via shape distillation from gpu execution profiles

JOB Weiss, T Alves, S Kundu - arxiv preprint arxiv:2304.03388, 2023 - arxiv.org
Deep Neural Networks (DNNs) have become ubiquitous due to their performance on
prediction and classification problems. However, they face a variety of threats as their usage …

Extracting DNN Architectures via Runtime Profiling on Mobile GPUs

DH Kim, JOB Weiss, S Kundu - IEEE Journal on Emerging and …, 2024 - ieeexplore.ieee.org
Deep Neural Networks (DNNs) have become invaluable intellectual property for AI providers
due to advancements fueled by a decade of research and development. However, recent …