Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/153409
Title: WaC : first results on practical side-channel attacks on commercial machine learning accelerator
Authors: Won, Yoo-Seung
Chatterjee, Soham
Jap, Dirmanto
Basu, Arindam
Bhasin, Shivam
Keywords: Science::Mathematics::Discrete mathematics::Cryptography
Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence
Issue Date: 2021
Source: Won, Y., Chatterjee, S., Jap, D., Basu, A. & Bhasin, S. (2021). WaC : first results on practical side-channel attacks on commercial machine learning accelerator. 5th Workshop on Attacks and Solutions in Hardware Security (ASHES '21), 111-114. https://dx.doi.org/10.1145/3474376.3487284
Project: NRF2018NCR-NCR009-0001
metadata.dc.contributor.conference: 5th Workshop on Attacks and Solutions in Hardware Security (ASHES '21)
Abstract: Commercial machine learning accelerators like Intel neural Compute Stick 2 (NCS2) enable efficient inference on otherwise low resource edge devices. However, these accelerators are also ex- posed to new threats leveraging physical access. In this paper, we present the first results demonstrating practical electromagnetic side-channel attack on NCS2, allowing secret weight recovery from executed models
URI: https://hdl.handle.net/10356/153409
DOI: 10.1145/3474376.3487284
Schools: School of Electrical and Electronic Engineering 
Research Centres: Temasek Laboratories 
Rights: © 2021 Association for Computing Machinery. All rights reserved.
Fulltext Permission: none
Fulltext Availability: No Fulltext
Appears in Collections:EEE Conference Papers
TL Conference Papers

Page view(s)

213
Updated on Jun 1, 2023

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.