Model extraction is a growing concern for the security of AI systems. For deep neural network models, the architecture is the most important information an adversary aims to recover. Being a sequence of repeated computation blocks, neural network models deployed on edge-devices will generate distinctive side-channel leakages. The latter can be exploited to extract critical information when targeted platforms are physically accessible. By combining theoretical knowledge about deep learning practices and analysis of a widespread implementation library (ARM CMSIS-NN), our purpose is to answer this critical question: how far can we extract architecture information by simply examining an EM side-channel trace? For the first time, we propose an e...
Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on uninten...
International audienceDuring the last decade, Deep Neural Networks (DNN) have progressively been int...
Deep learning-based side channel attacks are burgeoning due to their better efficiency and performan...
In-memory computing (IMC) systems have great potential for accelerating data-intensive tasks such as...
International audienceModel extraction is a major threat for embedded deep neural network models tha...
Model extraction emerges as a critical security threat with attack vectors exploiting both algorithm...
Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract...
Deep Neural Networks (DNNs) have become ubiquitous due to their performance on prediction and classi...
Security has become ever more important in today's quickly growing digital world as the number of di...
With growing popularity, deep learning (DL) models are becoming larger-scale, and only the companies...
A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical lea...
Recent trends of the use of deep neural networks (DNNs) in mission-critical applications have increa...
Masked cryptographic implementations can be vulnerable to higher-order attacks. For instance, deep ...
One of the main promoted advantages of deep learning in profiling sidechannel analysis is the possib...
Machine learning has become mainstream across industries. Numerous examples prove the validity of it...
Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on uninten...
International audienceDuring the last decade, Deep Neural Networks (DNN) have progressively been int...
Deep learning-based side channel attacks are burgeoning due to their better efficiency and performan...
In-memory computing (IMC) systems have great potential for accelerating data-intensive tasks such as...
International audienceModel extraction is a major threat for embedded deep neural network models tha...
Model extraction emerges as a critical security threat with attack vectors exploiting both algorithm...
Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract...
Deep Neural Networks (DNNs) have become ubiquitous due to their performance on prediction and classi...
Security has become ever more important in today's quickly growing digital world as the number of di...
With growing popularity, deep learning (DL) models are becoming larger-scale, and only the companies...
A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical lea...
Recent trends of the use of deep neural networks (DNNs) in mission-critical applications have increa...
Masked cryptographic implementations can be vulnerable to higher-order attacks. For instance, deep ...
One of the main promoted advantages of deep learning in profiling sidechannel analysis is the possib...
Machine learning has become mainstream across industries. Numerous examples prove the validity of it...
Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on uninten...
International audienceDuring the last decade, Deep Neural Networks (DNN) have progressively been int...
Deep learning-based side channel attacks are burgeoning due to their better efficiency and performan...