Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/153411
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Batina, Lejla | en_US |
dc.contributor.author | Bhasin, Shivam | en_US |
dc.contributor.author | Jap, Dirmanto | en_US |
dc.contributor.author | Picek, Stjepan | en_US |
dc.date.accessioned | 2021-12-07T13:44:55Z | - |
dc.date.available | 2021-12-07T13:44:55Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Batina, L., Bhasin, S., Jap, D. & Picek, S. (2021). SCA strikes back : reverse engineering neural network architectures using side channels. IEEE Design and Test. https://dx.doi.org/10.1109/MDAT.2021.3128436 | en_US |
dc.identifier.issn | 2168-2364 | en_US |
dc.identifier.uri | https://hdl.handle.net/10356/153411 | - |
dc.description.abstract | Our previous work selected for Top Picks in Hardware and Embedded Security 2020 demonstrates that it is possible to reverse engineer neural networks by using side-channel attacks. We developed a framework that considers each part of the neural network separately and then, by combining the information, manages to reverse engineer all relevant hyper-parameters and parameters. Our work is a proof of concept (but also a realistic demonstration) that such attacks are possible and warns that more effort should be given to developing countermeasures. While we have used microcontrollers for our experiments, the attack applies to other targets like FPGAs and GPUs. | en_US |
dc.description.sponsorship | National Research Foundation (NRF) | en_US |
dc.language.iso | en | en_US |
dc.relation | NRF2018NCR-NCR009-0001 | en_US |
dc.relation.ispartof | IEEE Design and Test | en_US |
dc.rights | © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/MDAT.2021.3128436. | en_US |
dc.subject | Science::Mathematics::Discrete mathematics::Cryptography | en_US |
dc.subject | Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence | en_US |
dc.title | SCA strikes back : reverse engineering neural network architectures using side channels | en_US |
dc.type | Journal Article | en |
dc.contributor.research | Temasek Laboratories @ NTU | en_US |
dc.identifier.doi | 10.1109/MDAT.2021.3128436 | - |
dc.description.version | Accepted version | en_US |
dc.subject.keywords | Biological Neural Networks | en_US |
dc.subject.keywords | Neurons | en_US |
dc.description.acknowledgement | This research is partly supported by the National Research Foundation, Singapore, under its National Cybersecurity Research & Development Programme / Cyber-Hardware Forensic & Assurance Evaluation R&D Programme (Award: NRF2018NCR-NCR009-0001) | en_US |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
Appears in Collections: | TL Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
DT_2021-06-0073_Jap.pdf | 2.93 MB | Adobe PDF | ![]() View/Open |
Page view(s)
39
Updated on Jul 6, 2022
Download(s) 50
55
Updated on Jul 6, 2022
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.