Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models (Englisch)
- Neue Suche nach: Hector, Kevin
- Neue Suche nach: Moëllic, Pierre-Alain
- Neue Suche nach: Dutertre, Jean-Max
- Neue Suche nach: Dumont, Mathieu
- Neue Suche nach: Katsikas, Sokratis
- Weitere Informationen zu Katsikas, Sokratis:
- https://orcid.org/https://orcid.org/0000-0003-2966-9683
- Neue Suche nach: Abie, Habtamu
- Weitere Informationen zu Abie, Habtamu:
- https://orcid.org/https://orcid.org/0000-0003-0866-5050
- Neue Suche nach: Ranise, Silvio
- Weitere Informationen zu Ranise, Silvio:
- https://orcid.org/https://orcid.org/0000-0001-7269-9285
- Neue Suche nach: Verderame, Luca
- Weitere Informationen zu Verderame, Luca:
- https://orcid.org/https://orcid.org/0000-0001-7155-7429
- Neue Suche nach: Cambiaso, Enrico
- Weitere Informationen zu Cambiaso, Enrico:
- https://orcid.org/https://orcid.org/0000-0002-6932-1975
- Neue Suche nach: Ugarelli, Rita
- Weitere Informationen zu Ugarelli, Rita:
- https://orcid.org/https://orcid.org/0000-0002-2096-8591
- Neue Suche nach: Praça, Isabel
- Weitere Informationen zu Praça, Isabel:
- https://orcid.org/https://orcid.org/0000-0002-2519-9859
- Neue Suche nach: Li, Wenjuan
- Weitere Informationen zu Li, Wenjuan:
- https://orcid.org/https://orcid.org/0000-0003-3745-5669
- Neue Suche nach: Meng, Weizhi
- Weitere Informationen zu Meng, Weizhi:
- https://orcid.org/https://orcid.org/0000-0003-4384-5786
- Neue Suche nach: Furnell, Steven
- Weitere Informationen zu Furnell, Steven:
- https://orcid.org/https://orcid.org/0000-0003-0984-7542
- Neue Suche nach: Katt, Basel
- Weitere Informationen zu Katt, Basel:
- https://orcid.org/https://orcid.org/0000-0002-0177-9496
- Neue Suche nach: Pirbhulal, Sandeep
- Weitere Informationen zu Pirbhulal, Sandeep:
- https://orcid.org/https://orcid.org/0000-0003-0843-8974
- Neue Suche nach: Shukla, Ankur
- Weitere Informationen zu Shukla, Ankur:
- https://orcid.org/https://orcid.org/0000-0002-6737-2031
- Neue Suche nach: Ianni, Michele
- Weitere Informationen zu Ianni, Michele:
- https://orcid.org/https://orcid.org/0000-0003-0562-7462
- Neue Suche nach: Dalla Preda, Mila
- Weitere Informationen zu Dalla Preda, Mila:
- https://orcid.org/https://orcid.org/0000-0003-2761-4347
- Neue Suche nach: Choo, Kim-Kwang Raymond
- Weitere Informationen zu Choo, Kim-Kwang Raymond:
- https://orcid.org/https://orcid.org/0000-0001-9208-5336
- Neue Suche nach: Pupo Correia, Miguel
- Neue Suche nach: Abhishta, Abhishta
- Weitere Informationen zu Abhishta, Abhishta:
- https://orcid.org/https://orcid.org/0000-0001-7122-3103
- Neue Suche nach: Sileno, Giovanni
- Neue Suche nach: Alishahi, Mina
- Neue Suche nach: Kalutarage, Harsha
- Weitere Informationen zu Kalutarage, Harsha:
- https://orcid.org/https://orcid.org/0000-0001-6430-9558
- Neue Suche nach: Yanai, Naoto
- Weitere Informationen zu Yanai, Naoto:
- https://orcid.org/https://orcid.org/0000-0002-0817-6188
- Neue Suche nach: Hector, Kevin
- Neue Suche nach: Moëllic, Pierre-Alain
- Neue Suche nach: Dutertre, Jean-Max
- Neue Suche nach: Dumont, Mathieu
In:
Computer Security. ESORICS 2023 International Workshops
: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II
;
Kapitel: 38
;
644-664
;
2024
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Katsikas, Sokratis ( Herausgeber:in ) / Abie, Habtamu ( Herausgeber:in ) / Ranise, Silvio ( Herausgeber:in ) / Verderame, Luca ( Herausgeber:in ) / Cambiaso, Enrico ( Herausgeber:in ) / Ugarelli, Rita ( Herausgeber:in ) / Praça, Isabel ( Herausgeber:in ) / Li, Wenjuan ( Herausgeber:in ) / Meng, Weizhi ( Herausgeber:in ) / Furnell, Steven ( Herausgeber:in )
-
Kongress:European Symposium on Research in Computer Security ; 2023 ; The Hague, The Netherlands
-
Erschienen in:Computer Security. ESORICS 2023 International Workshops : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II ; Kapitel: 38 ; 644-664Lecture Notes in Computer Science ; 14399 ; 644-664
-
Verlag:
- Neue Suche nach: Springer Nature Switzerland
-
Erscheinungsort:Cham
-
Erscheinungsdatum:12.03.2024
-
Format / Umfang:21 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
An Opportunity-Based Approach to Information Security RiskTran, Dinh Uy / Selnes, Sigrid Haug / Jøsang, Audun / Hagen, Janne et al. | 2024
- 2
-
A Methodology for Cybersecurity Risk Assessment in Supply ChainsGokkaya, Betul / Aniello, Leonardo / Karafili, Erisa / Halak, Basel et al. | 2024
- 3
-
IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical OperationsSaraiva, Guilherme / Apolinário, Filipe / Pardal, Miguel L. et al. | 2024
- 4
-
Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization FrameworkDias, Tiago Fontes / Vitorino, João / Fonseca, Tiago / Praça, Isabel / Maia, Eva / Viamonte, Maria João et al. | 2024
- 5
-
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPTDaniel, Nir / Kaiser, Florian Klaus / Dzega, Anton / Elyashar, Aviad / Puzis, Rami et al. | 2024
- 6
-
User Behavior Analysis for Malware DetectionDumitrasc, Valentina / Serral-Gracià, René et al. | 2024
- 7
-
Balancing XAI with Privacy and Security ConsiderationsSpartalis, Christoforos N. / Semertzidis, Theodoros / Daras, Petros et al. | 2024
- 8
-
Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack DetectionKalutharage, Chathuranga Sampath / Liu, Xiaodong / Chrysoulas, Christos / Bamgboye, Oluwaseun et al. | 2024
- 9
-
Digital Twins in Healthcare: Security, Privacy, Trust and Safety ChallengesJørgensen, Cecilie Solberg / Shukla, Ankur / Katt, Basel et al. | 2024
- 10
-
C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous DrivingAbdelsalam, Mohamed / Greiner, Simon / Aktouf, Oum-El-Kheir / Mercier, Annabelle et al. | 2024
- 11
-
The VOCODES Kill Chain for Voice Controllable DevicesEsposito, Sergio / Sgandurra, Daniele / Bella, Giampaolo et al. | 2024
- 12
-
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer NetworkBull, Victoria / Finne, Niclas / Agiollo, Andrea / Kaliyar, Pallavi / Pajola, Luca / Voigt, Thiemo / Conti, Mauro et al. | 2024
- 13
-
Firmware-Based DoS Attacks in Wireless Sensor NetworkLau, Phi Tuong / Katzenbeisser, Stefan et al. | 2024
- 14
-
Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client LifetimeCrescenzo, Giovanni Di / Khodjaeva, Matluba / Caro, Dilan D. Morales et al. | 2024
- 15
-
SigIL: A Signature-Based Approach of Malware Detection on Intermediate LanguageFortino, Giancarlo / Greco, Claudia / Guzzo, Antonella / Ianni, Michele et al. | 2024
- 16
-
Toward Next-Generation Cyber Range: A Comparative Study of Training PlatformsGrimaldi, Alexandre / Ribiollet, Julien / Nespoli, Pantaleone / Garcia-Alfaro, Joaquin et al. | 2024
- 17
-
Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided FuzzingMaugeri, Marcello / Daniele, Cristian / Bella, Giampaolo et al. | 2024
- 18
-
Trust Assumptions in Voting SystemsKrips, Kristjan / Snetkov, Nikita / Vakarjuk, Jelizaveta / Willemson, Jan et al. | 2024
- 19
-
Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-CycleKammüller, Florian et al. | 2024
- 20
-
Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static AnalysisRajapaksha, Sampath / Senanayake, Janaka / Kalutarage, Harsha / Al-Kadri, Mhd Omar et al. | 2024
- 21
-
Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86Zhou, Yuanding et al. | 2024
- 22
-
Execution at RISC: Stealth JOP Attacks on RISC-V ApplicationsBuckwell, Loïc / Gilles, Olivier / Pérez, Daniel Gracia / Kosmatov, Nikolai et al. | 2024
- 23
-
Modeling Obfuscation Stealth Through Code ComplexitySchrittwieser, Sebastian / Wimmer, Elisabeth / Mallinger, Kevin / Kochberger, Patrick / Lawitschka, Caroline / Raubitzek, Sebastian / Weippl, Edgar R. et al. | 2024
- 24
-
ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal ApproachGiagkos, Dimitrios / Kompougias, Orestis / Litke, Antonis / Papadakis, Nikolaos et al. | 2024
- 25
-
FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAISenanayake, Janaka / Kalutarage, Harsha / Petrovski, Andrei / Al-Kadri, Mhd Omar / Piras, Luca et al. | 2024
- 26
-
Finding Server-Side Endpoints with Static Analysis of Client-Side JavaScriptSigalov, Daniil / Gamayunov, Dennis et al. | 2024
- 27
-
The Nonce-nce of Web Security: An Investigation of CSP Nonces ReuseGolinelli, Matteo / Bonomi, Francesco / Crispo, Bruno et al. | 2024
- 28
-
Internet Transparency Through Multi-party ComputationMaćkowiak, Paweł / Kuipers, Fernando et al. | 2024
- 29
-
DNS Dependencies as an Expression of the Digital Divide: The Example of AustraliaNazemi, Niousha / Tavallaie, Omid / Zomaya, Albert Y. / Holz, Ralph et al. | 2024
- 30
-
Towards Security Transparency of Autonomous Systems on the InternetKhadka, Shyam Krishna / Holz, Ralph / Hesselman, Cristian et al. | 2024
- 31
-
Privacy-Preserving Object Recognition with Explainability in Smart SystemsAbbasi, Wisam / Mori, Paolo / Saracino, Andrea et al. | 2024
- 32
-
An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference FrameworkLiu, Tzu-Li / Ku, Yu-Te / Ho, Ming-Chien / Liu, Feng-Hao / Chang, Ming-Ching / Hsu, Chih-Fan / Chen, Wei-Chao / Hung, Shih-Hao et al. | 2024
- 33
-
Pixels Who Violate Our Privacy! Deep Learning for Identifying Images’ Key PixelsVeenker, Carmen / Opdam, Danny / Alishahi, Mina et al. | 2024
- 34
-
Verifiable Fairness: Privacy–preserving Computation of Fairness for Machine Learning SystemsToreini, Ehsan / Mehrnezhad, Maryam / van Moorsel, Aad et al. | 2024
- 35
-
NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel ScenariosJanisch, Jaromír / Pevný, Tomáš / Lisý, Viliam et al. | 2024
- 36
-
On the Use of AutoML for Combating Alert Fatigue in Security Operations CentersPreuveneers, Davy / Llamas, Javier Martínez / Bulut, Irfan / Rúa, Enrique Argones / Verfaillie, Pieter / Demortier, Vince / Surinx, Dimitri / Joosen, Wouter et al. | 2024
- 37
-
CO-DECYBER: Co-operative Decision Making for Cybersecurity Using Deep Multi-agent Reinforcement LearningCheah, Madeline / Stone, Jack / Haubrick, Peter / Bailey, Samuel / Rimmer, David / Till, Demian / Lacey, Matt / Kruczynska, Jo / Dorn, Mark et al. | 2024
- 38
-
Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network ModelsHector, Kevin / Moëllic, Pierre-Alain / Dutertre, Jean-Max / Dumont, Mathieu et al. | 2024
- 39
-
Can Inputs’ Reconstruction Information Be Coded into Machine Learning Model’s Outputs?Iwahana, Kazuki / Saisho, Osamu / Miura, Takayuki / Ito, Akira et al. | 2024
- 40
-
Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized SmoothingGibert, Daniel / Zizzo, Giulio / Le, Quan et al. | 2024
- 41
-
Backdoor Attacks Leveraging Latent Representation in Competitive LearningIwahana, Kazuki / Yanai, Naoto / Fujiwara, Toru et al. | 2024
- 42
-
Simulating Deception for Web Applications Using Reinforcement LearningKvasov, Andrei / Sahin, Merve / Hebert, Cedric / De Oliveira, Anderson Santana et al. | 2024
- 43
-
The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation EnvironmentsDrašar, Martin / Ruman, Ádám / Čeleda, Pavel / Yang, Shanchieh Jay et al. | 2024
- 44
-
Mitigating Gradient Inversion Attacks in Federated Learning with Frequency TransformationPalihawadana, Chamath / Wiratunga, Nirmalie / Kalutarage, Harsha / Wijekoon, Anjana et al. | 2024
- 45
-
Network Intrusion Detection by Variational Component-Based Feature Saliency Gaussian Mixture ClusteringHong, Xin / Papazachos, Zafeirios / del Rincon, Jesus Martinez / Miller, Paul et al. | 2024