ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1808.04761
  4. Cited By
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN
  Architectures

Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures

14 August 2018
Mengjia Yan
Christopher W. Fletcher
Josep Torrellas
    MIACV
    FedML
ArXivPDFHTML

Papers citing "Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures"

50 / 100 papers shown
Title
I Know What You Said: Unveiling Hardware Cache Side-Channels in Local Large Language Model Inference
I Know What You Said: Unveiling Hardware Cache Side-Channels in Local Large Language Model Inference
Zibo Gao
Junjie Hu
Feng Guo
Yixin Zhang
Yinglong Han
Siyuan Liu
Haiyang Li
Zhiqiang Lv
31
0
0
10 May 2025
Memory Under Siege: A Comprehensive Survey of Side-Channel Attacks on Memory
Memory Under Siege: A Comprehensive Survey of Side-Channel Attacks on Memory
MD Mahady Hassan
Shanto Roy
Reza Rahaeimehr
41
0
0
08 May 2025
Onboard Optimization and Learning: A Survey
Onboard Optimization and Learning: A Survey
Monirul Islam Pavel
Siyi Hu
Mahardhika Pratama
Ryszard Kowalczyk
26
0
0
07 May 2025
SONNI: Secure Oblivious Neural Network Inference
SONNI: Secure Oblivious Neural Network Inference
Luke Sperling
S. Kulkarni
24
0
0
26 Apr 2025
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye
Bradley Morgan
Gal Horowitz
Sioli O'Connell
S. V. Schaik
C. Chuengsatiansup
Daniel Genkin
Olaf Maennel
Paul Montague
Eyal Ronen
Y. Yarom
19
0
0
15 Apr 2025
THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models
THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models
Yujin Huang
Zhi Zhang
Qingchuan Zhao
Xingliang Yuan
Chunyang Chen
42
0
0
31 Mar 2025
THOR: A Non-Speculative Value Dependent Timing Side Channel Attack Exploiting Intel AMX
THOR: A Non-Speculative Value Dependent Timing Side Channel Attack Exploiting Intel AMX
Farshad Dizani
Azam Ghanbari
Joshua Kalyanapu
Darsh Asher
Samira Mirbagher Ajorpaz
67
0
0
24 Feb 2025
Make Shuffling Great Again: A Side-Channel Resistant Fisher-Yates Algorithm for Protecting Neural Networks
Make Shuffling Great Again: A Side-Channel Resistant Fisher-Yates Algorithm for Protecting Neural Networks
Leonard Puškáč
Marek Benovič
J. Breier
Xiaolu Hou
FedML
AAML
24
0
0
01 Jan 2025
A Semi Black-Box Adversarial Bit-Flip Attack with Limited DNN Model
  Information
A Semi Black-Box Adversarial Bit-Flip Attack with Limited DNN Model Information
B. Ghavami
Mani Sadati
M. Shahidzadeh
Lesley Shannon
S. Wilton
AAML
71
0
0
12 Dec 2024
DREAM: Domain-agnostic Reverse Engineering Attributes of Black-box Model
DREAM: Domain-agnostic Reverse Engineering Attributes of Black-box Model
Rongqing Li
Jiaqi Yu
Changsheng Li
Wenhan Luo
Ye Yuan
Guoren Wang
MLAU
80
0
0
08 Dec 2024
SoK: A Systems Perspective on Compound AI Threats and Countermeasures
SoK: A Systems Perspective on Compound AI Threats and Countermeasures
Sarbartha Banerjee
Prateek Sahu
Mulong Luo
Anjo Vahldiek-Oberwagner
N. Yadwadkar
Mohit Tiwari
AAML
77
0
0
20 Nov 2024
TEESlice: Protecting Sensitive Neural Network Models in Trusted
  Execution Environments When Attackers have Pre-Trained Models
TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models
Ding Li
Ziqi Zhang
Mengyu Yao
Y. Cai
Yao Guo
Xiangqun Chen
FedML
39
2
0
15 Nov 2024
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems
Linke Song
Zixuan Pang
Wenhao Wang
Zihao Wang
XiaoFeng Wang
Hongbo Chen
Wei Song
Yier Jin
Dan Meng
Rui Hou
56
7
0
30 Sep 2024
What Was Your Prompt? A Remote Keylogging Attack on AI Assistants
What Was Your Prompt? A Remote Keylogging Attack on AI Assistants
Roy Weiss
Daniel Ayzenshteyn
Guy Amit
Yisroel Mirsky
55
12
0
14 Mar 2024
Precise Extraction of Deep Learning Models via Side-Channel Attacks on
  Edge/Endpoint Devices
Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices
Younghan Lee
Sohee Jun
Yungi Cho
Woorim Han
Hyungon Moon
Y. Paek
AAML
21
2
0
05 Mar 2024
Stealing the Invisible: Unveiling Pre-Trained CNN Models through
  Adversarial Examples and Timing Side-Channels
Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels
Shubhi Shukla
Manaar Alam
Pabitra Mitra
Debdeep Mukhopadhyay
MLAU
AAML
37
1
0
19 Feb 2024
BarraCUDA: GPUs do Leak DNN Weights
BarraCUDA: GPUs do Leak DNN Weights
Péter Horváth
Lukasz Chmielewski
Léo Weissbart
L. Batina
Y. Yarom
22
0
0
12 Dec 2023
Threshold Breaker: Can Counter-Based RowHammer Prevention Mechanisms
  Truly Safeguard DRAM?
Threshold Breaker: Can Counter-Based RowHammer Prevention Mechanisms Truly Safeguard DRAM?
Ranyang Zhou
Jacqueline T. Liu
Sabbir Ahmed
Nakul Kochar
Adnan Siraj Rakin
Shaahin Angizi
22
5
0
28 Nov 2023
A Tale of Unrealized Hope: Hardware Performance Counter Against Cache Attacks
William Kosasih
18
0
0
17 Nov 2023
SparseLock: Securing Neural Network Models in Deep Learning Accelerators
SparseLock: Securing Neural Network Models in Deep Learning Accelerators
Nivedita Shrivastava
S. Sarangi
AAML
29
1
0
05 Nov 2023
Attacking Graph Neural Networks with Bit Flips: Weisfeiler and Lehman Go
  Indifferent
Attacking Graph Neural Networks with Bit Flips: Weisfeiler and Lehman Go Indifferent
Lorenz Kummer
Samir Moustafa
Nils N. Kriege
Wilfried N. Gansterer
GNN
AAML
27
0
0
02 Nov 2023
Revealing CNN Architectures via Side-Channel Analysis in Dataflow-based Inference Accelerators
Revealing CNN Architectures via Side-Channel Analysis in Dataflow-based Inference Accelerators
Hansika Weerasena
Prabhat Mishra
FedML
51
4
0
01 Nov 2023
BlackJack: Secure machine learning on IoT devices through hardware-based
  shuffling
BlackJack: Secure machine learning on IoT devices through hardware-based shuffling
Karthik Ganesan
Michal Fishkin
Ourong Lin
Natalie Enright Jerger
24
4
0
26 Oct 2023
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN
  Partition for On-Device ML
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML
Ziqi Zhang
Chen Gong
Yifeng Cai
Yuanyuan Yuan
Bingyan Liu
Ding Li
Yao Guo
Xiangqun Chen
FedML
37
16
0
11 Oct 2023
Beyond Labeling Oracles: What does it mean to steal ML models?
Beyond Labeling Oracles: What does it mean to steal ML models?
Avital Shafran
Ilia Shumailov
Murat A. Erdogdu
Nicolas Papernot
AAML
24
4
0
03 Oct 2023
DeepTheft: Stealing DNN Model Architectures through Power Side Channel
DeepTheft: Stealing DNN Model Architectures through Power Side Channel
Yansong Gao
Huming Qiu
Zhi-Li Zhang
Binghui Wang
Hua Ma
A. Abuadbba
Minhui Xue
Anmin Fu
Surya Nepal
MLAU
FedML
35
12
0
21 Sep 2023
Privacy Side Channels in Machine Learning Systems
Privacy Side Channels in Machine Learning Systems
Edoardo Debenedetti
Giorgio Severi
Nicholas Carlini
Christopher A. Choquette-Choo
Matthew Jagielski
Milad Nasr
Eric Wallace
Florian Tramèr
MIALM
43
38
0
11 Sep 2023
Data-Free Model Extraction Attacks in the Context of Object Detection
Data-Free Model Extraction Attacks in the Context of Object Detection
Harshit Shah
G. Aravindhan
Pavan Kulkarni
Yuvaraj Govidarajulu
Manojkumar Somabhai Parmar
MIACV
AAML
36
3
0
09 Aug 2023
Mercury: An Automated Remote Side-channel Attack to Nvidia Deep Learning
  Accelerator
Mercury: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator
Xi-ai Yan
Xiaoxuan Lou
Guowen Xu
Han Qiu
Shangwei Guo
Chip Hong Chang
Tianwei Zhang
AAML
19
7
0
02 Aug 2023
FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal
  Adversarial Masks
FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks
Buse G. A. Tekgul
Nadarajah Asokan
AAML
21
1
0
27 Jul 2023
DREAM: Domain-free Reverse Engineering Attributes of Black-box Model
DREAM: Domain-free Reverse Engineering Attributes of Black-box Model
Rongqing Li
Jiaqi Yu
Changsheng Li
Wenhan Luo
Ye Yuan
Guoren Wang
MLAU
21
0
0
20 Jul 2023
DNN-Defender: An in-DRAM Deep Neural Network Defense Mechanism for
  Adversarial Weight Attack
DNN-Defender: An in-DRAM Deep Neural Network Defense Mechanism for Adversarial Weight Attack
Ranyang Zhou
Sabbir Ahmed
Adnan Siraj Rakin
Shaahin Angizi
AAML
26
1
0
14 May 2023
Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning
  Accelerators
Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators
Hongye Xu
Dongfang Liu
Cory E. Merkel
Michael Zuzak
AAML
6
2
0
12 Apr 2023
EZClone: Improving DNN Model Extraction Attack via Shape Distillation
  from GPU Execution Profiles
EZClone: Improving DNN Model Extraction Attack via Shape Distillation from GPU Execution Profiles
Jonah O'Brien Weiss
Tiago A. O. Alves
S. Kundu
MIACV
AAML
FedML
17
8
0
06 Apr 2023
Rethinking White-Box Watermarks on Deep Learning Models under Neural
  Structural Obfuscation
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation
Yifan Yan
Xudong Pan
Mi Zhang
Min Yang
AAML
19
14
0
17 Mar 2023
Review of security techniques for memristor computing systems
Review of security techniques for memristor computing systems
Minhui Zou
Nan Du
Shahar Kvatinsky
AAML
16
7
0
19 Dec 2022
Hacky Racers: Exploiting Instruction-Level Parallelism to Generate
  Stealthy Fine-Grained Timers
Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained Timers
Haocheng Xiao
S. Ainsworth
SyDa
19
14
0
26 Nov 2022
Decompiling x86 Deep Neural Network Executables
Decompiling x86 Deep Neural Network Executables
Zhibo Liu
Yuanyuan Yuan
Shuai Wang
Xiaofei Xie
L. Ma
AAML
39
13
0
03 Oct 2022
Chameleon Cache: Approximating Fully Associative Caches with Random
  Replacement to Prevent Contention-Based Cache Attacks
Chameleon Cache: Approximating Fully Associative Caches with Random Replacement to Prevent Contention-Based Cache Attacks
Thomas Unterluggauer
Austin Harris
Scott D. Constable
Fangfei Liu
Carlos V. Rozas
AAML
21
8
0
29 Sep 2022
Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future
  Directions
Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future Directions
Chulin Xie
Zhong Cao
Yunhui Long
Diange Yang
Ding Zhao
Bo-wen Li
16
4
0
08 Sep 2022
Side-channel attack analysis on in-memory computing architectures
Side-channel attack analysis on in-memory computing architectures
Ziyu Wang
Fanruo Meng
Yongmo Park
Jason Eshraghian
Wei D. Lu
8
21
0
06 Sep 2022
Demystifying Arch-hints for Model Extraction: An Attack in Unified
  Memory System
Demystifying Arch-hints for Model Extraction: An Attack in Unified Memory System
Zhendong Wang
Xiaoming Zeng
Xulong Tang
Danfeng Zhang
Xingbo Hu
Yang Hu
AAML
MIACV
FedML
24
6
0
29 Aug 2022
Machine Learning with Confidential Computing: A Systematization of
  Knowledge
Machine Learning with Confidential Computing: A Systematization of Knowledge
Fan Mo
Zahra Tarkhani
Hamed Haddadi
37
8
0
22 Aug 2022
ObfuNAS: A Neural Architecture Search-based DNN Obfuscation Approach
ObfuNAS: A Neural Architecture Search-based DNN Obfuscation Approach
Tong Zhou
Shaolei Ren
Xiaolin Xu
AAML
24
13
0
17 Aug 2022
On the Evaluation of User Privacy in Deep Neural Networks using Timing
  Side Channel
On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Shubhi Shukla
Manaar Alam
Sarani Bhattacharya
Debdeep Mukhopadhyay
Pabitra Mitra
AAML
25
2
0
01 Aug 2022
Careful What You Wish For: on the Extraction of Adversarially Trained
  Models
Careful What You Wish For: on the Extraction of Adversarially Trained Models
Kacem Khaled
Gabriela Nicolescu
F. Magalhães
MIACV
AAML
27
4
0
21 Jul 2022
Revealing Secrets From Pre-trained Models
Revealing Secrets From Pre-trained Models
Mujahid Al Rafi
Yuan Feng
Hyeran Jeon
15
0
0
19 Jul 2022
I Know What You Trained Last Summer: A Survey on Stealing Machine
  Learning Models and Defences
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences
Daryna Oliynyk
Rudolf Mayer
Andreas Rauber
39
106
0
16 Jun 2022
Learning to Reverse DNNs from AI Programs Automatically
Learning to Reverse DNNs from AI Programs Automatically
Simin Chen
Hamed Khanpour
Cong Liu
Wei Yang
35
15
0
20 May 2022
Cracking White-box DNN Watermarks via Invariant Neuron Transforms
Cracking White-box DNN Watermarks via Invariant Neuron Transforms
Yifan Yan
Xudong Pan
Yining Wang
Mi Zhang
Min Yang
AAML
17
14
0
30 Apr 2022
12
Next