DNN model theft through trojan side-channel on edge FPGA accelerator
In this paper, we present a novel hardware trojan assisted side-channel attack to reverse engineer DNN architectures on edge FPGA accelerators. In particular, our attack targets the widely-used Versatile Tensor Accelerator (VTA). A hardware trojan is employed to track the memory transactions by moni...
Main Authors: | Chandrasekar, Srivatsan, Lam, Siew-Kei, Thambipillai, Srikanthan |
---|---|
Other Authors: | College of Computing and Data Science |
Format: | Conference Paper |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/178536 |
Similar Items
-
Mercury: an automated remote side-channel attack to Nvidia deep learning accelerator
by: Yan, Xiaobei, et al.
Published: (2023) -
Exploiting FPGA Block Memories for Protected Cryptographic Implementations
by: Bhasin, Shivam, et al.
Published: (2016) -
Conventional and deep-learning-based side-channel analysis on embedded devices
by: Gao, Diyan
Published: (2025) -
Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
by: He, Wei, et al.
Published: (2017) -
Accelerating continual learning on edge FPGA
by: Piyasena, Duvindu, et al.
Published: (2024)