Back to Search Start Over

On Implementation-Level Security of Edge-Based Machine Learning Models

Authors :
Batina, L.
Bäck, T.
Buhan, I.
Picek, S.
Bhasin, S.
Breier, J.
Hou, X.
Jap, D.
Batina, L.
Bäck, T.
Buhan, I.
Picek, S.
Bhasin, S.
Breier, J.
Hou, X.
Jap, D.
Source :
Batina, L.; Bäck, T.; Buhan, I. (ed.), Security and Artificial Intelligence: A Crossdisciplinary Approach; 335; 359; 9783030987954; Lecture notes in compute science ; 13049; Batina, L.; Bäck, T.; Buhan, I. (ed.), Security and Artificial Intelligence: A Crossdisciplinary Approach~~335~359~~9783030987954~~~~Lecture notes in compute science ; 13049~
Publication Year :
2022

Abstract

Item does not contain fulltext<br />In this chapter, we are considering the physical security of Machine Learning (ML) implementations on Edge Devices. We list the state-of-the-art known physical attacks, with the main attack objectives to reverse engineer and misclassify ML models. These attacks have been reported for different target platforms with the usage of both passive and active attacks. The presented works highlight the potential threat of stealing an intellectual property or confidential model trained with private data, and also the possibility to tamper with the device during the execution to cause misclassification. We also discus possible countermeasures to mitigate such attacks.

Details

Database :
OAIster
Journal :
Batina, L.; Bäck, T.; Buhan, I. (ed.), Security and Artificial Intelligence: A Crossdisciplinary Approach; 335; 359; 9783030987954; Lecture notes in compute science ; 13049; Batina, L.; Bäck, T.; Buhan, I. (ed.), Security and Artificial Intelligence: A Crossdisciplinary Approach~~335~359~~9783030987954~~~~Lecture notes in compute science ; 13049~
Publication Type :
Electronic Resource
Accession number :
edsoai.on1331099076
Document Type :
Electronic Resource