Our previous work selected for Top Picks in Hardware and Embedded Security 2020 demonstrates that it is possible to reverse engineer neural networks by using side-channel attacks. We developed a framework that considers each part of the neural network separately and then, by combining the information, manages to reverse engineer all relevant hyper-parameters and parameters. Our work is a proof of concept (but also a realistic demonstration) that such attacks are possible and warns that more effort should be given to developing countermeasures. While we have used microcontrollers for our experiments, the attack applies to other targets like FPGAs and GPUs.National Research Foundation (NRF)Accepted versionThis research is partly supported by ...
Hardware implementations of encryption schemes are unprotected against side-channel analysis techniq...
Side-channel analysis (SCA) can obtain information related to the secret key by exploiting leakages ...
Side-channel attacks (SCA), which use unintended leakage to retrieve a secret cryptographic key, hav...
This paper was selected for Top Picks in Hardware and Embedded Security 2020 and it presents a physi...
International audienceDuring the last decade, Deep Neural Networks (DNN) have progressively been int...
Machine learning has become mainstream across industries. Numerous examples prove the validity of it...
Security has become ever more important in today's quickly growing digital world as the number of di...
Some of the most prominent types of attacks against modern cryptographic implementations are side-ch...
Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract...
Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device...
Cryptographic systems are getting unbreakable on paper. Therefore attacks on the implementations usi...
Side-channel attacks leverage the unintentional leakage of information that indirectly relates to cr...
Companies have extensively developed deep Neural Network (DNN) models for a wide range of applicatio...
A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical lea...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Hardware implementations of encryption schemes are unprotected against side-channel analysis techniq...
Side-channel analysis (SCA) can obtain information related to the secret key by exploiting leakages ...
Side-channel attacks (SCA), which use unintended leakage to retrieve a secret cryptographic key, hav...
This paper was selected for Top Picks in Hardware and Embedded Security 2020 and it presents a physi...
International audienceDuring the last decade, Deep Neural Networks (DNN) have progressively been int...
Machine learning has become mainstream across industries. Numerous examples prove the validity of it...
Security has become ever more important in today's quickly growing digital world as the number of di...
Some of the most prominent types of attacks against modern cryptographic implementations are side-ch...
Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract...
Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device...
Cryptographic systems are getting unbreakable on paper. Therefore attacks on the implementations usi...
Side-channel attacks leverage the unintentional leakage of information that indirectly relates to cr...
Companies have extensively developed deep Neural Network (DNN) models for a wide range of applicatio...
A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical lea...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Hardware implementations of encryption schemes are unprotected against side-channel analysis techniq...
Side-channel analysis (SCA) can obtain information related to the secret key by exploiting leakages ...
Side-channel attacks (SCA), which use unintended leakage to retrieve a secret cryptographic key, hav...