We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

CAAD VILLAGE - GeekPwn - The Uprising Geekpwn AI/Robotics Cybersecurity Contest U.S. 2018 - Hardware Trojan Attacks on Neural Networks

00:00

Formal Metadata

Title
CAAD VILLAGE - GeekPwn - The Uprising Geekpwn AI/Robotics Cybersecurity Contest U.S. 2018 - Hardware Trojan Attacks on Neural Networks
Title of Series
Number of Parts
322
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Driven by their accessibility and ubiquity, deep learning has seen rapid growth into a variety of fields, in recent years, including many safety-critical areas. With the rising demands for computational power and speed in machine learning, there is a growing need for hardware architectures optimized for deep learning and other machine learning models, specifically in tightly constrained edge based systems. Unfortunately, the modern fabless business model of manufacturing hardware, while economic, leads to deficiencies in security through the supply chain. In addition, the embedded, distributed, unsupervised, and physically exposed nature of edge devices would make various hardware or physical attacks on edge devices as critical threats. In this talk, I will first introduce the landscape of adversarial machine learning on the edge. I will discuss several new attacks on neural networks from the hardware or physical perspective. I will then present our method for inserting a backdoor into neural networks. Our method is distinct from prior attacks in that it was generated to neither alter the weights nor inputs of a neural network. But rather, it inserts a backdoor by altering the functionality of operations implemented by the network on those parameters during the production of the neural network. Joseph Clements works with Dr. Yingjie Lao’s Secure and Innovative Computing Research Group conducting research on Adversarial AI in edge based Deep Learning technologies. In the fall semester of 2017, Joseph joined Clemson University’s Holcombe Department of Electrical and Computer Engineering in pursuit of his PhD. He graduated with a bachelor’s degree in computer engineering from the University of South Alabama in May of 2016. There, he engaged in research with Dr. Mark Yampolskiy on the security of additive manufacturing and cyber-physical systems. His research interests include machine learning and artificial intelligence, security and VLSI design.
Trojanisches Pferd <Informatik>Computer hardwareArtificial neural networkStudent's t-testMusical ensembleArtificial neural networkApproximationAreaCryptographyComputerInformation securityComputer hardwareLatent heatHomomorphismusMachine learningFocus (optics)DistanceGroup actionComputer scientist
Content (media)Information securityDomain nameField (computer science)Computer hardwareMachine learningVirtual machineDirection (geometry)Presentation of a groupMereologyOnline help
Point cloudWave packetPersonal digital assistantSet (mathematics)MalwarePoint cloudMachine learningInferenceVirtual machineProgramming paradigmRevision controlPattern recognitionPhase transitionData modelFunction (mathematics)AreaImplementationCartesian coordinate systemPhysical systemInformation securityEmailHypermediaObservational studySpacetimeComputer animation
Machine learningCloud computingInformation securityInferencePoint cloudPhysical systemVirtual machineMobile appCASE <Informatik>Cartesian coordinate system
Graph (mathematics)InferenceInfinite conjugacy class propertyChainMaxima and minimaInformation securityComputerData modelPhase transitionVirtual machineCloud computingInferenceComputer hardwarePhysical systemChainSoftwareComputing platformAdditionTelecommunicationPower (physics)TwitterPoint cloudArtificial neural networkProduct (business)Wave packetConstraint (mathematics)Pairwise comparisonImplementationLimit (category theory)Information securityAlgorithmMathematical optimizationMaterialization (paranormal)Level (video gaming)Cartesian coordinate systemSystem administratorState of matterMachine learningMereology
Data modelDigital electronicsIP addressChainMathematical analysisBusiness modelPhysical systemInformation securityFamilyLogic gateDigital photographyVulnerability (computing)
Computer hardwareTime domainComputer hardwareDomain nameInformation privacyCopyright infringementSide channel attackRevision controlSoftware development kit
Copyright infringementSoftware developerCopyright infringementPeripheralChainCategory of beingComputer hardwareIP addressSoftwareGroup actionBuildingMultiplication sign
Infinite conjugacy class propertyPhysicalismMereologyFunctional (mathematics)SoftwareChainRevision controlComputer hardwareDigital electronicsReverse engineeringReal numberGame theoryLogical constant
Infinite conjugacy class propertyAbsolute valueVulnerability (computing)Physical systemComputerEncryptionImplementationChainComputer hardwarePeripheralSide channel attackFunctional (mathematics)Information securityAlgorithmGraph (mathematics)InformationClassical physicsCybersexQuantumBit
ChainTrojanisches Pferd <Informatik>Data typeKey (cryptography)Digital electronicsComputer hardwareSoftwareFunctional (mathematics)Mathematics
Trojanisches Pferd <Informatik>Computer hardwareComputer hardwareDifferent (Kate Ryan album)Information securityTrojanisches Pferd <Informatik>Computer worm2 (number)Digital electronicsConnectivity (graph theory)Sound effectRadical (chemistry)
Computer hardwareTrojanisches Pferd <Informatik>Artificial neural networkKey (cryptography)Operator (mathematics)ImplementationWave packetWeightArtificial neural networkBackdoor (computing)Network socketoutputParameter (computer programming)Product (business)ChainComputer hardwareComputer engineeringFunction (mathematics)Phase transitionFunctional (mathematics)Connectivity (graph theory)Trojanisches Pferd <Informatik>CASE <Informatik>SoftwareAffine space2 (number)Category of beingContext awarenessDifferent (Kate Ryan album)Forcing (mathematics)
outputImplementationArtificial neural networkOperator (mathematics)Level (video gaming)Functional (mathematics)Function (mathematics)Flow separationUsabilityBinary multiplierCASE <Informatik>2 (number)QuicksortType theoryComputer animation
outputKey (cryptography)Artificial neural networkoutputOperator (mathematics)Selectivity (electronic)Constraint (mathematics)Function (mathematics)Form (programming)Intermediate value theoremSet (mathematics)Randomization
Perturbation theoryRevision controlPerturbation theoryIntermediate value theoremParameter (computer programming)Operator (mathematics)Computer hardwareoutputImplementationFunction (mathematics)Artificial neural networkInformation2 (number)PerimeterComputer animation
ImplementationComputer hardwareMilitary operationSubsetAxiom of choiceOperator (mathematics)CASE <Informatik>1 (number)
Trojanisches Pferd <Informatik>Computer hardwareComputer hardwareVirtual machineTrojanisches Pferd <Informatik>Operator (mathematics)Binary multiplierPower (physics)Data modelFunction (mathematics)Software testing1 (number)Revision controlConstraint (mathematics)Functional (mathematics)Different (Kate Ryan album)outputCombinational logicSound effectMetric systemMachine learningDistribution (mathematics)Side channel attackConcentricCategory of beingCASE <Informatik>RandomizationBit rateSet (mathematics)Multiplication sign
Direction (geometry)Information securitySoftware developerTrojanisches Pferd <Informatik>Physical systemComputer hardwareVirtual machineMachine learningWave packetProgramming paradigmField (computer science)ImplementationContext awarenessInferenceData modelSound effectPhysicalismPhase transitionObservational studyAnnihilator (ring theory)ResultantChainPoint cloud
Transcript: English(auto-generated)