{"id":"https://openalex.org/W4292074612","doi":"https://doi.org/10.1109/host54066.2022.9839882","title":"Characterizing Side-Channel Leakage of DNN Classifiers though Performance Counters","display_name":"Characterizing Side-Channel Leakage of DNN Classifiers though Performance Counters","publication_year":2022,"publication_date":"2022-06-27","ids":{"openalex":"https://openalex.org/W4292074612","doi":"https://doi.org/10.1109/host54066.2022.9839882"},"language":"en","primary_location":{"id":"doi:10.1109/host54066.2022.9839882","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host54066.2022.9839882","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009379780","display_name":"Saikat Majumdar","orcid":"https://orcid.org/0000-0002-7971-5214"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Saikat Majumdar","raw_affiliation_strings":["The Ohio State University,Department of Computer Science and Engineering,Columbus,OH,USA","Department of Computer Science and Engineering, The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"The Ohio State University,Department of Computer Science and Engineering,Columbus,OH,USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079796402","display_name":"Mohammad Hossein Samavatian","orcid":"https://orcid.org/0009-0007-7274-1333"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Hossein Samavatian","raw_affiliation_strings":["The Ohio State University,Department of Computer Science and Engineering,Columbus,OH,USA","Department of Computer Science and Engineering, The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"The Ohio State University,Department of Computer Science and Engineering,Columbus,OH,USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091455049","display_name":"Radu Teodorescu","orcid":"https://orcid.org/0000-0002-6474-2201"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Radu Teodorescu","raw_affiliation_strings":["The Ohio State University,Department of Computer Science and Engineering,Columbus,OH,USA","Department of Computer Science and Engineering, The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"The Ohio State University,Department of Computer Science and Engineering,Columbus,OH,USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009379780"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08061868,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"45","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8356499671936035},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7711008787155151},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6293578147888184},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6194487810134888},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5080711841583252},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4849238693714142},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.47690510749816895},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.45499545335769653},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.44734641909599304},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.44727402925491333},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4408232569694519},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4305684268474579},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.4302191138267517},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.12912777066230774},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1230337917804718},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10353842377662659},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.09767395257949829}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8356499671936035},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7711008787155151},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6293578147888184},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6194487810134888},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5080711841583252},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4849238693714142},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.47690510749816895},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45499545335769653},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.44734641909599304},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.44727402925491333},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4408232569694519},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4305684268474579},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.4302191138267517},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.12912777066230774},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1230337917804718},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10353842377662659},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.09767395257949829},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/host54066.2022.9839882","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host54066.2022.9839882","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G277827375","display_name":null,"funder_award_id":"CCF-2028944 and CCF-1629392","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1562542037","https://openalex.org/W1686810756","https://openalex.org/W2154909745","https://openalex.org/W2163605009","https://openalex.org/W2199175040","https://openalex.org/W2535690855","https://openalex.org/W2809523935","https://openalex.org/W2903123103","https://openalex.org/W2906604232","https://openalex.org/W2963446712","https://openalex.org/W2964248614","https://openalex.org/W2965565691","https://openalex.org/W2987241895","https://openalex.org/W3007346474","https://openalex.org/W3118608800","https://openalex.org/W3132111889","https://openalex.org/W4221158932","https://openalex.org/W4289146347","https://openalex.org/W6637373629","https://openalex.org/W6684191040","https://openalex.org/W6757970183","https://openalex.org/W6766787143"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2055733372","https://openalex.org/W3022067003"],"abstract_inverted_index":{"Rapid":[0],"advancements":[1],"in":[2,12],"Deep":[3],"Neural":[4],"Networks":[5],"(DNN)":[6],"have":[7,42,53],"led":[8],"to":[9,35,45,48,79,93,132],"their":[10,62],"deployment":[11],"a":[13,26,98,106,118],"wide":[14],"range":[15],"of":[16,29,61,76],"com-mercial":[17],"applications.":[18],"DNN":[19,82],"classifiers":[20],"are":[21],"powerful":[22],"tools":[23],"that":[24,124],"drive":[25],"broad":[27],"spectrum":[28],"important":[30],"applications,":[31,40],"from":[32],"image":[33],"recognition":[34],"autonomous":[36],"vehicles.":[37],"Like":[38],"other":[39],"they":[41],"been":[43,54],"shown":[44],"be":[46],"vulnerable":[47],"side-channel":[49,109],"information":[50,110],"leakage.":[51],"There":[52],"several":[55],"proof-of-concept":[56],"attacks":[57],"demon-strating":[58],"the":[59,74,81,101,114,126,135],"extraction":[60],"model":[63,139],"parameters":[64],"and":[65,108,150],"input":[66],"data.":[67],"However,":[68],"no":[69],"prior":[70],"study":[71],"has":[72],"examined":[73],"possibility":[75],"using":[77],"side-channels":[78],"extract":[80],"classifier's":[83],"decision":[84],"or":[85],"output.":[86],"In":[87],"this":[88],"initial":[89,121],"study,":[90],"we":[91],"aim":[92],"understand":[94],"if":[95],"there":[96],"exists":[97],"correlation":[99],"between":[100],"output":[102,136],"class":[103,137],"selected":[104],"by":[105],"classifier":[107],"collected":[111],"while":[112],"running":[113],"inference":[115],"process":[116],"on":[117],"CPU.":[119],"Our":[120],"evaluation":[122],"shows":[123],"with":[125],"proposed":[127],"approach":[128],"it":[129],"is":[130],"possible":[131],"accurately":[133],"recover":[134],"for":[138],"inputs":[140],"via":[141],"multiple":[142],"side-channels:":[143],"primarily":[144],"power,":[145],"but":[146],"also":[147],"branch":[148],"mispredictions":[149],"cache":[151],"misses.":[152]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
