2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2019
DOI: 10.1109/isvlsi.2019.00122
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Reverse Engineering Attacks on Deep Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…Liu et al [44] aim to prevent recovery of the architecture through memory access patterns attacks. Their method first considers Hua et al [34] as a baseline attack, but proves the security of its protection against stronger memory access pattern attacks.…”
Section: Summary and Countermeasuresmentioning
confidence: 99%
“…Liu et al [44] aim to prevent recovery of the architecture through memory access patterns attacks. Their method first considers Hua et al [34] as a baseline attack, but proves the security of its protection against stronger memory access pattern attacks.…”
Section: Summary and Countermeasuresmentioning
confidence: 99%
“…Relatively stronger defenses include the use of encryption [34][35], i.e., data confidentiality, while outsourcing the data for training. Similarly, measures to ensure IP privacy during third-party DNN training include the use of multiple training servers for joint dataset [99], verifying the training procedure [100], ensuring privacy after training by network transformation [101], obfuscating defenses against reverse engineeringbased attacks [102], [103], and isolating the hardware accelerators [104].…”
Section: Defending Against Ip Stealingmentioning
confidence: 99%
“…Side-channel analysis on inference systems [14, 40-42, 44, 57, 58, 79, 87, 103, 110, 115], by contrast, can succeed with significantly fewer tests and are harder to prevent as we learned from the research on cryptographic engineering. Side-channel analysis can steal both the input data of the customer [110] and the model of the service provider [14], the general architecture of the deployed AI system [79] and the detailed, bit-level values of its coefficients [41]. The defenses against digital side-channels, such as timing sidechannels, are relatively more natural to establish for specialized accelerators (as opposed to general-purpose engines) because the design tools enable cycle-accurate control and simulation.…”
Section: Research and Standardsmentioning
confidence: 99%