[1] L Batina, S. Bhasin, Dirmanto Jap, and S. Picek, “{CSI} {NN}: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel,” USENIX Security Symposium, pp. 515–532, Jan. 2019.
[2] D. Mukhopadhyay and R. S. Chakraborty, Hardware Security. Chapman and Hall/CRC, 2014.
[3] M. Shafique et al., “Robust Machine Learning Systems: Challenges, Current Trends, Perspectives, and the Road Ahead,” IEEE Design & Test, pp. 1–1, 2020.
[4] F. Khalid, Muhammad Abdullah Hanif, S. Rehman, R. Ahmed, and M. Shafique, “TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks,” 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), 188–93. Rhodes, Greece: IEEE, 2019.
[5] Y. Liu et al., “Trojaning Attack on Neural Networks,” Proceedings 2018 Network and Distributed System Security Symposium, 2018.
[6] W. Hua, Z. Zhang, and G. Edward Suh, “Reverse engineering convolutional neural networks through side-channel information leaks,” Proc. Des. Autom. Conf., vol. Part F1377, 2018.
[7] J. Breier, Dirmanto Jap, X. Hou, S. Bhasin, and Y. Liu, “SNIFF: Reverse Engineering of Neural Networks With Fault Attacks,” IEEE transactions on reliability, vol. 71, no. 4, pp. 1527–1539, Dec. 2022.
[8] A. Dubey, R. Cammarota, and A. Aysu, “MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection,” IEEE Xplore, Available on ieeexplore.ieee.org/abstract/document/9300276, Accessed 2023.
[9] H. Naghibijouybari, A. Neupane, Z. Qian, and N. Abu-Ghazaleh, “Rendered Insecure,” Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Jan. 2018.
[10] M. Yan, C. Fletcher, and J. Torrellas, “Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures,” arXiv.org, Aug. 14, 2018. http://arxiv.org/abs/1808.04761 (accessed Jul. 12, 2024).
[11] K. Yoshida, T. Kubota, M. Shiozaki, and T. Fujino, “Model-Extraction Attack Against FPGADNN Accelerator Utilizing Correlation Electromagnetic Analysis,” Proc. - 27th IEEE Int. Symp. Field-Programmable Cust. Comput. Mach. FCCM 2019, vol. 2018, no. 4, p. 318, 2019.
[12] F. Schellenberg, D. R. E. Gnad, A. Moradi, and M. B. Tahoori, “An inside job: Remote power analysis attacks on FPGAs,” 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar. 2018.
[13] A. Alexandre, Y. Souissi, S. Guilley, and J.L. Danger, “RSM: a Small and Fast Countermeasure for AES, Secure against 1st and 2ndorder Zero-Offset SCAs,” Design Automation and Test in Europe, Mar 2012, Dresden, Germany. pp.1173-1178. hal-00666337.
[14] E. Brier, C. Clavier, and F. Olivier, “Correlation Power Analysis with a Leakage Model,” Lecture Notes in Computer Science, pp. 16–29, 2004.
[15] D. Guo, K. Chen, X. Hu, Y. Wei, and J. Li, “A Survey of Prototype Side-channel Attacks Based on Machine Learning Algorithms for Cryptographic Chips,” Journal of physics. Conference series, vol. 1176, pp. 032005–032005, Mar. 2019.
[16] I. Goodfellow, Y Bengio, and A. Courville. Deep learning. MIT press, 2016.
http://www.deeplearningbook.org
[17] Tom M. Mitchell, Machine Learning, 1 ed. McGraw-Hill, Inc., New York, NY, USA, 1997.
[18] S. Mangard, T. Popp, and B. Gammel, “SideChannel Leakage of Masked CMOS Gates,” pp. 351–365, Feb. 2005.
[19] Milad Salimian, and Ali Jahanian. “Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks.” Isecure., vol. 13, no. 2, 1 July 2021, pp. 163–176.