International audienceDuring the last decade, Deep Neural Networks (DNN) have progressively been integrated on all types of platforms, from data centers to embedded systems including low-power processors and, recently, FPGAs. Neural Networks (NN) are expected to become ubiquitous in IoT systems by transforming all sorts of real-world applications, including applications in the safety-critical and security-sensitive domains. However, the underlying hardware security vulnerabilities of embedded NN implementations remain unaddressed. In particular, embedded DNN implementations are vulnerable to Side-Channel Analysis (SCA) attacks, which are especially important in the IoT and edge computing contexts where an attacker can usually gain physical ...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Analog compute‐in‐memory (CIM) systems are promising candidates for deep neural network (DNN) infere...
In-memory computing (IMC) systems have great potential for accelerating data-intensive tasks such as...
International audienceDuring the last decade, Deep Neural Networks (DNN) have progressively been int...
The advancement of digital silicon technology brings a variety of novel embedded systems to our dail...
This paper was selected for Top Picks in Hardware and Embedded Security 2020 and it presents a physi...
Companies have extensively developed deep Neural Network (DNN) models for a wide range of applicatio...
Our previous work selected for Top Picks in Hardware and Embedded Security 2020 demonstrates that it...
Security has become ever more important in today's quickly growing digital world as the number of di...
International audienceDeep learning is currently integrated into edge devices with strong energy con...
A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical lea...
Recent trends of the use of deep neural networks (DNNs) in mission-critical applications have increa...
Presented on October 18, 2019 at 12:00 p.m in the Krone Engineered Biosystems Building, room 1005.Ar...
Machine learning has become mainstream across industries. Numerous examples prove the validity of it...
The expansion of the Internet of Things (IoT) raises the concern of security measures on resource-co...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Analog compute‐in‐memory (CIM) systems are promising candidates for deep neural network (DNN) infere...
In-memory computing (IMC) systems have great potential for accelerating data-intensive tasks such as...
International audienceDuring the last decade, Deep Neural Networks (DNN) have progressively been int...
The advancement of digital silicon technology brings a variety of novel embedded systems to our dail...
This paper was selected for Top Picks in Hardware and Embedded Security 2020 and it presents a physi...
Companies have extensively developed deep Neural Network (DNN) models for a wide range of applicatio...
Our previous work selected for Top Picks in Hardware and Embedded Security 2020 demonstrates that it...
Security has become ever more important in today's quickly growing digital world as the number of di...
International audienceDeep learning is currently integrated into edge devices with strong energy con...
A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical lea...
Recent trends of the use of deep neural networks (DNNs) in mission-critical applications have increa...
Presented on October 18, 2019 at 12:00 p.m in the Krone Engineered Biosystems Building, room 1005.Ar...
Machine learning has become mainstream across industries. Numerous examples prove the validity of it...
The expansion of the Internet of Things (IoT) raises the concern of security measures on resource-co...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Analog compute‐in‐memory (CIM) systems are promising candidates for deep neural network (DNN) infere...
In-memory computing (IMC) systems have great potential for accelerating data-intensive tasks such as...