Layer sequence extraction of optimized DNNs using side-channel information leaks
Deep Neural Network (DNN) Intellectual Property (IP) models must be kept undisclosed to avoid revealing trade secrets. Recent works have devised machine learning techniques that leverage on side-channel information leakage of the target platform to reverse engineer DNN architectures. However, these...
Main Authors: | Sun, Yidan, Jiang, Guiyuan, Liu, Xinwang, He, Peilan, Lam, Siew-Kei |
---|---|
Other Authors: | School of Computer Science and Engineering |
Format: | Journal Article |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/178546 |
Similar Items
-
Streamlining DNN obfuscation to defend against model stealing attacks
by: Sun, Yidan, et al.
Published: (2024) -
Timing Black-Box Attacks: Crafting Adversarial Examples through Timing Leaks against DNNs on Embedded Devices
by: Tsunato Nakai, et al.
Published: (2021-07-01) -
Deep Learning Side-Channel Collision Attack
by: Marvin Staib, et al.
Published: (2023-06-01) -
A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis
by: Petr Socha, et al.
Published: (2022-10-01) -
Side-channel attacks and machine learning approach
by: Alia Levina, et al.
Published: (2016-04-01)