Reverse Engineering Convolutional Neural Networks Through Side-Channel Information Leaks

2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC)(2018)

引用 254|浏览150
暂无评分
摘要
A convolutional neural network (CNN) model represents a crucial piece of intellectual property in many applications. Revealing its structure or weights would leak confidential information. In this paper we present novel reverse-engineering attacks on CNNs running MI a hardware accelerator, Where an adversary can feed inpals to the accelerator and observe the resulting off-chip memory accesses. Our study shows that even with data encryption, the adversary can infer the ',underlying network structure by exploiting the memory and timing side-channels. We further identify the information leakage on the values of weights when a CNN accelerator performs dynamic zero pruning for off-chip memory accesses. Overall, this work reveals the importance of hiding off-chip memory access pattern to truly protect confidential CNN models.
更多
查看译文
关键词
reverse engineering convolutional neural networks,side-channel information leaks,convolutional neural network model,intellectual property,confidential information,reverse-engineering attacks,hardware accelerator,information leakage,CNN accelerator performs,off-chip memory access pattern,confidential CNN models,off-chip memory accesses,network structure,side-channel timing,dynamic zero pruning,data encryption
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要