Reverse Engineering Convolutional Neural Networks Through Side-channel Information Leaks

被引:133
作者
Hua, Weizhe [1 ]
Zhang, Zhiru [1 ]
Suh, G. Edward [1 ]
机构
[1] Cornell Univ, Sch Elect & Comp Engn, Ithaca, NY 14850 USA
来源
2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC) | 2018年
关键词
D O I
10.1145/3195970.3196105
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A convolutional neural network (CNN) model represents a crucial piece of intellectual property in many applications. Revealing its structure or weights would leak confidential information. In this paper we present novel reverse-engineering attacks on CNNs running MI a hardware accelerator, Where an adversary can feed inpals to the accelerator and observe the resulting off-chip memory accesses. Our study shows that even with data encryption, the adversary can infer the ',underlying network structure by exploiting the memory and timing side-channels. We further identify the information leakage on the values of weights when a CNN accelerator performs dynamic zero pruning for off-chip memory accesses. Overall, this work reveals the importance of hiding off-chip memory access pattern to truly protect confidential CNN models.
引用
收藏
页数:6
相关论文
共 17 条
[1]  
[Anonymous], 2016, CoRR
[2]  
[Anonymous], 2013, CCS
[3]  
[Anonymous], 2017, ISCA
[4]  
[Anonymous], 2016, ISCA
[5]  
[Anonymous], 2015, CORR
[6]  
[Anonymous], 2016, PROC INT C LEARN REP
[7]  
[Anonymous], 2015, P 22 ACM SIGSAC C CO
[8]  
[Anonymous], 2016, ISCA
[9]  
[Anonymous], INT J INF SECUR
[10]  
[Anonymous], 1996, J ACM