DNN model theft through trojan side-channel on edge FPGA accelerator
In this paper, we present a novel hardware trojan assisted side-channel attack to reverse engineer DNN architectures on edge FPGA accelerators. In particular, our attack targets the widely-used Versatile Tensor Accelerator (VTA). A hardware trojan is employed to track the memory transactions by moni...
Saved in:
Main Authors: | , , |
---|---|
其他作者: | |
格式: | Conference or Workshop Item |
語言: | English |
出版: |
2024
|
主題: | |
在線閱讀: | https://hdl.handle.net/10356/178536 |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|