With the advent of tinyML, IoT devices have expanded their range of operations from simple data gathering and transmission to full-fledged inference. This expansion has been further enabled by the rise in popularity of open-source hardware, with the RISC-V architecture being the most prominent example. TinyML's decentralization can solve the current privacy and security issues of IoT infrastructures. However, it also shifts the burden of security on already resource-constrained devices. Ultra-low-power devices, in particular, often sacrifice security features for energy and area efficiency. This work aims at showing that, in the context of edge computing based on open-source hardware, neglecting hardware security features for the sake of efficiency is not an acceptable trade-off with respect to AI security.
Model theft attack against a tinyML application running on an Ultra-Low-Power Open-Source SoC / Porsia, Antonio; Ruospo, Annachiara; Sanchez, Ernesto. - ELETTRONICO. - (2024), pp. 63-66. (Intervento presentato al convegno 21st ACM International Conference on Computing Frontiers Workshops and Special Sessions (CF '24 Companion) tenutosi a Ischia (IT) nel 07-09/05/2024) [10.1145/3637543.3652877].
Model theft attack against a tinyML application running on an Ultra-Low-Power Open-Source SoC
Porsia, Antonio;Ruospo, Annachiara;Sanchez, Ernesto
2024
Abstract
With the advent of tinyML, IoT devices have expanded their range of operations from simple data gathering and transmission to full-fledged inference. This expansion has been further enabled by the rise in popularity of open-source hardware, with the RISC-V architecture being the most prominent example. TinyML's decentralization can solve the current privacy and security issues of IoT infrastructures. However, it also shifts the burden of security on already resource-constrained devices. Ultra-low-power devices, in particular, often sacrifice security features for energy and area efficiency. This work aims at showing that, in the context of edge computing based on open-source hardware, neglecting hardware security features for the sake of efficiency is not an acceptable trade-off with respect to AI security.File | Dimensione | Formato | |
---|---|---|---|
OSHW24.pdf
accesso aperto
Descrizione: Accepted version
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
Pubblico - Tutti i diritti riservati
Dimensione
436.53 kB
Formato
Adobe PDF
|
436.53 kB | Adobe PDF | Visualizza/Apri |
3637543.3652877.pdf
accesso riservato
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
482.59 kB
Formato
Adobe PDF
|
482.59 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2987887