DNN model theft through trojan side-channel on edge FPGA accelerator
In this paper, we present a novel hardware trojan assisted side-channel attack to reverse engineer DNN architectures on edge FPGA accelerators. In particular, our attack targets the widely-used Versatile Tensor Accelerator (VTA). A hardware trojan is employed to track the memory transactions by moni...
Saved in:
Main Authors: | Chandrasekar, Srivatsan, Lam, Siew-Kei, Thambipillai, Srikanthan |
---|---|
Other Authors: | College of Computing and Data Science |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/178536 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Mercury: an automated remote side-channel attack to Nvidia deep learning accelerator
by: Yan, Xiaobei, et al.
Published: (2023) -
Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
by: He, Wei, et al.
Published: (2017) -
EFFICIENT SIDE-CHANNEL ATTACKS AND MACHINE LEARNING BASED SECURITY SOLUTIONS FOR SOC
by: FANG QIANG
Published: (2023) -
Walls have ears: Eavesdropping user behaviors via graphics-interrupt-based side channel
by: MA, Haoyu, et al.
Published: (2020) -
Exploiting FPGA Block Memories for Protected Cryptographic Implementations
by: Bhasin, Shivam, et al.
Published: (2016)