Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/147418
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Regazzoni, Francesco | en_US |
dc.contributor.author | Bhasin, Shivam | en_US |
dc.contributor.author | Pour, Amir Ali | en_US |
dc.contributor.author | Alshaer, Ihab | en_US |
dc.contributor.author | Aydin, Furkan | en_US |
dc.contributor.author | Aysu, Aydin | en_US |
dc.contributor.author | Beroulle, Vincent | en_US |
dc.contributor.author | Di Natale, Giorgio | en_US |
dc.contributor.author | Franzon, Paul | en_US |
dc.contributor.author | Hely, David | en_US |
dc.contributor.author | Homma, Naofumi | en_US |
dc.contributor.author | Ito, Akira | en_US |
dc.contributor.author | Jap, Dirmanto | en_US |
dc.contributor.author | Kashyap, Priyank | en_US |
dc.contributor.author | Polian, Ilia | en_US |
dc.contributor.author | Potluri, Seetal | en_US |
dc.contributor.author | Ueno, Rei | en_US |
dc.contributor.author | Vatajelu, Elena-Ioana | en_US |
dc.contributor.author | Yli-Mäyry, Ville | en_US |
dc.date.accessioned | 2021-04-06T06:35:07Z | - |
dc.date.available | 2021-04-06T06:35:07Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Regazzoni, F., Bhasin, S., Pour, A. A., Alshaer, I., Aydin, F., Aysu, A., Beroulle, V., Di Natale, G., Franzon, P., Hely, D., Homma, N., Ito, A., Jap, D., Kashyap, P., Polian, I., Potluri, S., Ueno, R., Vatajelu, E. & Yli-Mäyry, V. (2020). Machine learning and hardware security : challenges and opportunities. IEEE/ACM International Conference On Computer-Aided Design, Digest of Technical Papers, ICCAD, 2020-November, 1-6. https://dx.doi.org/10.1145/3400302.3416260 | en_US |
dc.identifier.isbn | 9781450380263 | - |
dc.identifier.issn | 1558-2434 | en_US |
dc.identifier.uri | https://hdl.handle.net/10356/147418 | - |
dc.description.abstract | Machine learning techniques have significantly changed our lives. They helped improving our everyday routines, but they also demonstrated to be an extremely helpful tool for more advanced and complex applications. However, the implications of hardware security problems under a massive diffusion of machine learning techniques are still to be completely understood. This paper first highlights novel applications of machine learning for hardware security, such as evaluation of post quantum cryptography hardware and extraction of physically unclonable functions from neural networks. Later, practical model extraction attack based on electromagnetic side-channel measurements are demonstrated followed by a discussion of strategies to protect proprietary models by watermarking them. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD | en_US |
dc.rights | © 2020 Institute of Electrical and Electronics Engineers (IEEE). All rights reserved. | en_US |
dc.subject | Engineering::Computer science and engineering | en_US |
dc.title | Machine learning and hardware security : challenges and opportunities | en_US |
dc.type | Journal Article | en |
dc.contributor.research | Temasek Laboratories @ NTU | en_US |
dc.identifier.doi | 10.1145/3400302.3416260 | - |
dc.identifier.scopus | 2-s2.0-85097934656 | - |
dc.identifier.volume | 2020-November | en_US |
dc.identifier.spage | 1 | en_US |
dc.identifier.epage | 6 | en_US |
dc.subject.keywords | Hardware Security | en_US |
dc.subject.keywords | Machine Learning | en_US |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
Appears in Collections: | TL Journal Articles |
SCOPUSTM
Citations
20
8
Updated on Jun 3, 2023
Web of ScienceTM
Citations
50
1
Updated on May 28, 2023
Page view(s)
205
Updated on Jun 4, 2023
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.