Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels – Attacks and Defenses
Main Authors: | Maji, Saurav, Banerjee, Utsav, Chandrakasan, Anantha P |
---|---|
Other Authors: | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science |
Format: | Article |
Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2021
|
Online Access: | https://hdl.handle.net/1721.1/130245 |
Similar Items
-
A Secure Digital In-Memory Compute (IMC) Macro with Protections for Side-Channel and Bus Probing Attacks
by: Ashok, Maitreyi, et al.
Published: (2024) -
Poster : recovering the input of neural networks via single shot side-channel attacks
by: Batina, Lejla, et al.
Published: (2021) -
A Low-Power Elliptic Curve Pairing Crypto-Processor for Secure Embedded Blockchain and Functional Encryption
by: Banerjee, Utsav, et al.
Published: (2021) -
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
by: Lou, Xiaoxuan, et al.
Published: (2022) -
TAD : time side-channel attack defense of obfuscated source code
by: Fell, Alexander, et al.
Published: (2021)