2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2020
DOI: 10.1109/host45689.2020.9300274
|View full text |Cite
|
Sign up to set email alerts
|

DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(58 citation statements)
references
References 24 publications
0
58
0
Order By: Relevance
“…The time domain is used according to Tramèr et al [5], because it links a layer's parameters with the execution time of its sequential computations. For each layer type, Yu et al [35] determine the number of parameters depending on the layer's hyperparameters. Because EM traces are closely linked to that number of parameters and the computations executed, they can use this to identify the layer types based on the EM signatures.…”
Section: Memory Access Pattern Attackmentioning
confidence: 99%
“…The time domain is used according to Tramèr et al [5], because it links a layer's parameters with the execution time of its sequential computations. For each layer type, Yu et al [35] determine the number of parameters depending on the layer's hyperparameters. Because EM traces are closely linked to that number of parameters and the computations executed, they can use this to identify the layer types based on the EM signatures.…”
Section: Memory Access Pattern Attackmentioning
confidence: 99%
“…Dubey et al [24] have also demonstrated an attack that can successfully reveal the parameters of Binarized Neural Network (BNN) using Differential Power Analysis (DPA). DeepEM [173] reverse engineers the model structure of BNN through the EM side-channel of the FPGA accelerator. It exploits the synthetic dataset generated by Random, FeatureAdversary and FeatureFool algorithms to recover the binarized weight parameters.…”
Section: Side-channel Attacks On MLmentioning
confidence: 99%
“…Model extraction attacks against BNN hardware have been reported in recent years [3], [4]. Dubey et al [3] demonstrated an attack on the adder-tree function of the authors' custom BNN hardware.…”
Section: Introductionmentioning
confidence: 99%
“…Dubey et al [3] demonstrated an attack on the adder-tree function of the authors' custom BNN hardware. In [4], the authors recovered the architecture of a targeted BNN through timing analysis with electromagnetic (EM) emanations from the data bus of a BNN accelerator, and built substitute models using this information. Such attacks have encouraged recent works to analyze neural network structures with side-channel countermeasures [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation