F. Regazzoni, S. Bhasin, Amir Ali Pour, Ihab Alshaer, Furkan Aydin, Aydin Aysu, V. Beroulle, Giorgio Di Natale, P. Franzon, D. Hély, N. Homma, Akira Ito, Dirmanto Jap, Priyank Kashyap, I. Polian, S. Potluri, Rei Ueno, E. Vatajelu, Ville Yli-Mäyry
{"title":"机器学习和硬件安全:挑战与机遇","authors":"F. Regazzoni, S. Bhasin, Amir Ali Pour, Ihab Alshaer, Furkan Aydin, Aydin Aysu, V. Beroulle, Giorgio Di Natale, P. Franzon, D. Hély, N. Homma, Akira Ito, Dirmanto Jap, Priyank Kashyap, I. Polian, S. Potluri, Rei Ueno, E. Vatajelu, Ville Yli-Mäyry","doi":"10.1145/3400302.3416260","DOIUrl":null,"url":null,"abstract":"Machine learning techniques have significantly changed our lives. They helped improving our everyday routines, but they also demonstrated to be an extremely helpful tool for more advanced and complex applications. However, the implications of hardware security problems under a massive diffusion of machine learning techniques are still to be completely understood. This paper first highlights novel applications of machine learning for hardware security, such as evaluation of post quantum cryptography hardware and extraction of physically unclonable functions from neural networks. Later, practical model extraction attack based on electromagnetic side-channel measurements are demonstrated followed by a discussion of strategies to protect proprietary models by watermarking them.","PeriodicalId":367868,"journal":{"name":"Proceedings of the 39th International Conference on Computer-Aided Design","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Machine learning and hardware security: challenges and opportunities\",\"authors\":\"F. Regazzoni, S. Bhasin, Amir Ali Pour, Ihab Alshaer, Furkan Aydin, Aydin Aysu, V. Beroulle, Giorgio Di Natale, P. Franzon, D. Hély, N. Homma, Akira Ito, Dirmanto Jap, Priyank Kashyap, I. Polian, S. Potluri, Rei Ueno, E. Vatajelu, Ville Yli-Mäyry\",\"doi\":\"10.1145/3400302.3416260\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Machine learning techniques have significantly changed our lives. They helped improving our everyday routines, but they also demonstrated to be an extremely helpful tool for more advanced and complex applications. However, the implications of hardware security problems under a massive diffusion of machine learning techniques are still to be completely understood. This paper first highlights novel applications of machine learning for hardware security, such as evaluation of post quantum cryptography hardware and extraction of physically unclonable functions from neural networks. Later, practical model extraction attack based on electromagnetic side-channel measurements are demonstrated followed by a discussion of strategies to protect proprietary models by watermarking them.\",\"PeriodicalId\":367868,\"journal\":{\"name\":\"Proceedings of the 39th International Conference on Computer-Aided Design\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 39th International Conference on Computer-Aided Design\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3400302.3416260\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 39th International Conference on Computer-Aided Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3400302.3416260","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Machine learning and hardware security: challenges and opportunities
Machine learning techniques have significantly changed our lives. They helped improving our everyday routines, but they also demonstrated to be an extremely helpful tool for more advanced and complex applications. However, the implications of hardware security problems under a massive diffusion of machine learning techniques are still to be completely understood. This paper first highlights novel applications of machine learning for hardware security, such as evaluation of post quantum cryptography hardware and extraction of physically unclonable functions from neural networks. Later, practical model extraction attack based on electromagnetic side-channel measurements are demonstrated followed by a discussion of strategies to protect proprietary models by watermarking them.