2021 International Conference on Electronics, Information, and Communication (ICEIC) 2021
DOI: 10.1109/iceic51217.2021.9369754
|View full text |Cite
|
Sign up to set email alerts
|

Time to Leak: Cross-Device Timing Attack On Edge Deep Learning Accelerator

Abstract: Edge deep learning accelerators are optimised hardware to enable efficient inference on the edge. The models deployed on these accelerators are often proprietary and thus sensitive for commercial and privacy reasons. In this paper, we demonstrate practical vulnerability of deployed deep learning models to timing side-channel attacks. By measuring the execution time of the inference, the adversary can determine and reconstruct the model from a known family of well known deep learning model and then use availabl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Machine Learning as a Service (MLaaS) and artificial intelligent (AI) compilers for mapping pretrained DNN models onto efficient edge accelerator platform. The emerging model extraction techniques [1]- [4] make it feasible to reverse engineer a deployed DNN model and rebuild an AI product or solution with similar quality at a lower cost than re-designing a DNN from scratch. The rampant DNN IP infringement is further exacerbated by the lack of buyer traceability to deter fraudsters from misappropriation of distributed models.…”
Section: Introductionmentioning
confidence: 99%
“…Machine Learning as a Service (MLaaS) and artificial intelligent (AI) compilers for mapping pretrained DNN models onto efficient edge accelerator platform. The emerging model extraction techniques [1]- [4] make it feasible to reverse engineer a deployed DNN model and rebuild an AI product or solution with similar quality at a lower cost than re-designing a DNN from scratch. The rampant DNN IP infringement is further exacerbated by the lack of buyer traceability to deter fraudsters from misappropriation of distributed models.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, side-channel attacks [8][9][10][11][12][13] have been discovered in recent years. Through some characteristic information such as the algorithm execution time and power loss, attackers can reveal some important information of the cryptographic system, even secret information such as private keys.…”
Section: Introductionmentioning
confidence: 99%
“…In the past 10 years, cryptography has made great progress in expanding the adversary model to cover side-channel attacks [1][2][3][4], and researchers have built some provably secure cryptographic schemes that can resist some side-channel attacks. In most theoretical work, it is assumed that the participants have complete confidentiality to their local computation.…”
Section: Introductionmentioning
confidence: 99%
“…The side-channel attack obtains secret information about the cryptographic system by measuring the surrounding environment of the machine that is executing the related algorithms. For example, an attacker obtains the relevant confidential information of the cryptographic system by measuring and analyzing the time [4] or the electromagnetic radiation [8] of the specific algorithm. Through the "cold start" attack [9], if an adversary can access the corresponding physical device, it can recover part of the key of the cryptographic system even when the power has just been cut off.…”
Section: Introductionmentioning
confidence: 99%