Proceedings of the 55th Annual Design Automation Conference 2018
DOI: 10.1145/3195970.3196105
|View full text |Cite
|
Sign up to set email alerts
|

Reverse engineering convolutional neural networks through side-channel information leaks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 80 publications
(19 citation statements)
references
References 9 publications
0
19
0
Order By: Relevance
“…The adversary can obtain this value from the training set and model. Hua et al [56] "investigated reverse-engineering attacks on CNN models exploiting information leaks through memory and timing side-channels".…”
Section: Model Extractionmentioning
confidence: 99%
“…The adversary can obtain this value from the training set and model. Hua et al [56] "investigated reverse-engineering attacks on CNN models exploiting information leaks through memory and timing side-channels".…”
Section: Model Extractionmentioning
confidence: 99%
“…The aim is to duplicate the functionality of the target model. Hua et al [7] proposed to exploit information leakage through timing (and memory) side-channels targeting DNN accelerators running in a secure enclave like SGX. Batina et al [8] proposed a generic model recovery by side-channels.…”
Section: B Related Workmentioning
confidence: 99%
“…SCA attacks are relatively cheap to perform, and hard and expensive to protect against. Recently SCA attacks have been applied to steal the IP of DNN models [4,9,14]. [17], facilitate differential fault analysis for secret key retrieval [3], or simply disrupt or shut down the operation [16].…”
Section: Side-channel Analysismentioning
confidence: 99%