Skip to main navigation Skip to search Skip to main content

Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-

  • Francesco Regazzoni
  • , Shivam Bhasin
  • , Amir Ali Pour
  • , Ihab Alshaer
  • , Furkan Aydin
  • , Aydin Aysu
  • , Vincent Beroulle
  • , Giorgio Di Natale
  • , Paul Franzon
  • , David Hely
  • , Naofumi Homma
  • , Akira Ito
  • , Dirmanto Jap
  • , Priyank Kashyap
  • , Ilia Polian
  • , Seetal Potluri
  • , Rei Ueno
  • , Elena Ioana Vatajelu
  • , Ville Yli-Mayry
  • University of Amsterdam
  • Nanyang Technological University
  • Institut polytechnique de Grenoble
  • Université Grenoble Alpes
  • North Carolina State University

Research output: Contribution to journalConference articlepeer-review

23 Scopus citations

Abstract

Machine learning techniques have significantly changed our lives. They helped improving our everyday routines, but they also demonstrated to be an extremely helpful tool for more advanced and complex applications. However, the implications of hardware security problems under a massive diffusion of machine learning techniques are still to be completely understood. This paper first highlights novel applications of machine learning for hardware security, such as evaluation of post quantum cryptography hardware and extraction of physically unclonable functions from neural networks. Later, practical model extraction attack based on electromagnetic side-channel measurements are demonstrated followed by a discussion of strategies to protect proprietary models by watermarking them.

Original languageEnglish
Article number9256522
JournalIEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers
Volume2020-November
DOIs
StatePublished - Nov 2 2020
Event39th IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2020 - Virtual, San Diego, United States
Duration: Nov 2 2020Nov 5 2020

Fingerprint

Dive into the research topics of 'Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-'. Together they form a unique fingerprint.

Cite this