Neural network applications have become popular in both enterprise and
personal settings. Network solutions are tuned meticulously for each task, and
designs that can robustly resolve queries end up in high demand. As the
commercial value of accurate and performant machine learning models increases,
so too does the demand to protect neural architectures as confidential
investments. We explore the vulnerability of neural networks deployed as black
boxes across accelerated hardware through electromagnetic side channels. We
examine the magnetic flux emanating from a graphics processing unit's power
cable, as acquired by a cheap 3inductionsensor,andfindthatthissignalbetraysthedetailedtopologyandhyperparametersofablack−boxneuralnetworkmodel.Theattackacquiresthemagneticsignalforonequerywithunknowninputvalues,butknowninputdimensions.Thenetworkreconstructionispossibleduetothemodularlayersequenceinwhichdeepneuralnetworksareevaluated.Wefindthateachlayercomponent′sevaluationproducesanidentifiablemagneticsignalsignature,fromwhichlayertopology,width,functiontype,andsequenceordercanbeinferredusingasuitablytrainedclassifierandajointconsistencyoptimizationbasedonintegerprogramming.Westudytheextenttowhichnetworkspecificationscanberecovered,andconsidermetricsforcomparingnetworksimilarity.Wedemonstratethepotentialaccuracyofthissidechannelattackinrecoveringthedetailsforabroadrangeofnetworkarchitectures,includingrandomdesigns.Weconsiderapplicationsthatmayexploitthisnovelsidechannelexposure,suchasadversarialtransferattacks.Inresponse,wediscusscountermeasurestoprotectagainstourmethodandothersimilarsnoopingtechniques.