과제정보
This work was supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government(MSIT) (No.2018-0-00264, Research on Blockchain Security Technology for IoT Services, 50%) and this work was supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT)(No.2022-0-00627, Development of Lightweight BIoT technology for Highly Constrained Devices, 50%).
참고문헌
- LeCun, Yann, Yoshua Bengio, and Geoffrey Hinton. "Deep learning." nature 521.7553 (2015): 436-444. https://doi.org/10.1038/nature14539
- Joye, Marc, and Francis Olivier. "Side-Channel Analysis." (2011):1198-1204.
- Mangard, Stefan, Elisabeth Oswald, and Thomas Popp. Power analysis attacks: Revealing the secrets of smart cards. Vol. 31. Springer Science & Business Media, 2008.
- Kocher, Paul, Joshua Jaffe, and Benjamin Jun. "Differential power analysis." Advances in Cryptology-CRYPTO'99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15-19, 1999 Proceedings 19. Springer Berlin Heidelberg, 1999.
- Brier, Eric, Christophe Clavier, and Francis Olivier. "Correlation power analysis with a leakage model." Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings 6. Springer Berlin Heidelberg, 2004.
- Yoshida, Kota, et al. "Model reverse-engineering attack using correlation power analysis against systolic array based neural network accelerator." 2020 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2020.
- Yoshida, Kota, et al. "Model reverse-engineering attack against systolic-array-based dnn accelerator using correlation power analysis." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 104.1 (2021): 152-161. https://doi.org/10.1587/transfun.2020CIP0024
- Maji, Saurav, Utsav Banerjee, and Anantha P. Chandrakasan. "Leaky nets: Recovering embedded neural network models and inputs through simple power and timing side-channels-Attacks and defenses." IEEE Internet of Things Journal 8.15 (2021): 12079-12092. https://doi.org/10.1109/JIOT.2021.3061314
- Liu, Yuntao, Dana Dachman-Soled, and Ankur Srivastava. "Mitigating reverse engineering attacks on deep neural networks." 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2019.
- Athanasiou, Konstantinos, et al. "Masking feedforward neural networks against power analysis attacks." proceedings on privacy enhancing technologies (2022).