Trained to leak: Hiding trojan side-channels in neural network weights

V Meyers, M Hefenbrock, D Gnad… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Applications driven by neural networks (NNs) have been advancing various work flows in
industries and everyday life. FPGA accelerators are a popular low latency solution for NN …

Bake it till you make it: Heat-induced power leakage from masked neural networks

DM Mehta, M Hashemi, DS Koblah… - IACR Transactions …, 2024 - ojs.ub.ruhr-uni-bochum.de
Masking has become one of the most effective approaches for securing hardware designs
against side-channel attacks. Regardless of the effort put into correctly implementing …

Reliability and security of ai hardware

D Gnad, M Gotthard, J Krautter… - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
In recent years, Artificial Intelligence (AI) systems have achieved revolutionary capabilities,
providing intelligent solutions that surpass human skills in many cases. However, such …

A lightweight non-oscillatory delay-sensor for remote power analysis

A Fellah-Touta, L Bossuet… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Traditionally, there have been two main obstacles for practical power analysis attacks: the
adversary needed physical access to the device, and they had to use sophisticated sensing …

[HTML][HTML] Leveraging Neural Trojan Side-Channels for Output Exfiltration

V Meyers, M Hefenbrock, D Gnad, M Tahoori - Cryptography, 2025 - mdpi.com
Neural networks have become pivotal in advancing applications across various domains,
including healthcare, finance, surveillance, and autonomous systems. To achieve low …

Practical Implementations of Remote Power Side-Channel and Fault-Injection Attacks on Multitenant FPGAs

DG Mahmoud, O Glamočanin, F Regazzoni… - Security of FPGA …, 2023 - Springer
Cloud computing environments increasingly provision FPGAs because of their fine-grained,
highly parallel, and flexible hardware architecture. The availability of FPGAs in the cloud …

Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs (Extended Version)

V Meyers, DRE Gnad, NM Dang… - Cryptology ePrint …, 2023 - eprint.iacr.org
FPGAs have been used in the cloud since several years, as accelerators for various
workloads such as machine learning, database processes and security tasks. As for other …

Non-Invasive Attack on Ring Oscillator-based PUFs through Localized X-Ray Irradiation

NEO Tebina, A Douadi, L Salvo… - … Security and Trust …, 2024 - ieeexplore.ieee.org
Physical Unclonable Functions (PUFs) are emerging as a fundamental component of secure
architectures that provide services such as authentication and key generation. A specific …

Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks

S Shen, C ** - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Garbled circuits (GC) are a secure multiparty computation protocol that enables two parties
to jointly compute a function using their private data without revealing it to each other. While …

Investigating time-digital-converters for hardware security in fpgas

D Lytikov - 2024 - ir.library.oregonstate.edu
In this comprehensive thesis, we present a series of experiments and findings that highlight
the critical importance of TDC Voltage Sensors in the hardware security domain. Our …