2023
DOI: 10.1007/978-3-031-25319-5_3
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters

Abstract: Model extraction is a growing concern for the security of AI systems. For deep neural network models, the architecture is the most important information an adversary aims to recover. Being a sequence of repeated computation blocks, neural network models deployed on edge-devices will generate distinctive side-channel leakages. The latter can be exploited to extract critical information when targeted platforms are physically accessible. By combining theoretical knowledge about deep learning practices and analysi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Assuming the Hamming weight (HW) model as the leakage model as in previous works [8], [15], [16], we compute CPA-guesses G based on H (Y ), where H (x) denotes the HW of the IEEE 754 representation of the variable x.…”
Section: Cpa On Floating-point Arithmeticmentioning
confidence: 99%
See 2 more Smart Citations
“…Assuming the Hamming weight (HW) model as the leakage model as in previous works [8], [15], [16], we compute CPA-guesses G based on H (Y ), where H (x) denotes the HW of the IEEE 754 representation of the variable x.…”
Section: Cpa On Floating-point Arithmeticmentioning
confidence: 99%
“…In particular, precise extraction of target models, so-called model reverse-engineering, attempts to recover the model architecture and/or model parameters of deep neural networks (DNNs). Model reverse-engineering attacks based on sidechannel analysis (SCA), such as timing analysis (TA) [3] and power analysis (PA) [4] -typically correlation power analysis (CPA) [5], correlation electromagnetic analysis (CEMA) [6], and simple power analysis (SPA) [4] -, are now being proposed [7]- [16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To validate the methodology introduced in Section 3.1, the NNOM softmax function is targeted. We choose this implementation as it is a common solution in the literature [20,35,51,58]. Whereas traditional softmax function is defined by a normalization which maps the logits (or the confidence scores) to a probability distribution following…”
Section: Security Flawmentioning
confidence: 99%
“…In [6], Batina et al proposed a hardware attack scenario based on side-channel attacks, in order to steal the IP and the inputs of a targeted embedded model. The practicability of the latter scenario has nevertheless been questioned when an attacker has to deal with real-world and complex DNN implementations [34]. A second key consideration for the IP comes from the privacy of the input data during training and inference time.…”
Section: Introductionmentioning
confidence: 99%