Time to leak : cross-device timing attack on edge deep learning accelerator
Edge deep learning accelerators are optimised hard ware to enable efficient inference on the edge. The models deployed on these accelerators are often proprietary and thus sensitive for commercial and privacy reasons. In this paper, we demonstrate practical vulnerability of deployed deep learning mo...
Main Authors: | Won, Yoo-Seung, Chatterjee, Soham, Jap, Dirmanto, Bhasin, Shivam, Basu, Arindam |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Conference Paper |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/147150 |
Similar Items
-
DeepFreeze : cold boot attacks and high fidelity model recovery on commercial EdgeML device
by: Won, Yoo-Seung, et al.
Published: (2022) -
WaC : first results on practical side-channel attacks on commercial machine learning accelerator
by: Won, Yoo-Seung, et al.
Published: (2021) -
Non-profiled side-channel attack based on deep learning using picture trace
by: Won, Yoo-Seung, et al.
Published: (2021) -
Push for more : on comparison of data augmentation and SMOTE with optimised deep learning architecture for side-channel
by: Won, Yoo-Seung, et al.
Published: (2021) -
Using model optimization as countermeasure against model recovery attacks
by: Jap, Dirmanto, et al.
Published: (2024)