{"id":"https://openalex.org/W4386859304","doi":"https://doi.org/10.1109/islped58423.2023.10244398","title":"Enabling DVFS Side-Channel Attacks for Neural Network Fingerprinting in Edge Inference Services","display_name":"Enabling DVFS Side-Channel Attacks for Neural Network Fingerprinting in Edge Inference Services","publication_year":2023,"publication_date":"2023-08-07","ids":{"openalex":"https://openalex.org/W4386859304","doi":"https://doi.org/10.1109/islped58423.2023.10244398"},"language":"en","primary_location":{"id":"doi:10.1109/islped58423.2023.10244398","is_oa":false,"landing_page_url":"https://doi.org/10.1109/islped58423.2023.10244398","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011685545","display_name":"Erich Malan","orcid":"https://orcid.org/0000-0003-1887-9060"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Erich Malan","raw_affiliation_strings":["Politecnico di Torino,Department of Control and Computer Engineering,Turin,Italy","Department of Control and Computer Engineering, Politecnico di Torino, Turin, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Department of Control and Computer Engineering,Turin,Italy","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Turin, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084909548","display_name":"Valentino Peluso","orcid":"https://orcid.org/0000-0003-0527-8602"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Valentino Peluso","raw_affiliation_strings":["Politecnico di Torino,Department of Control and Computer Engineering,Turin,Italy","Department of Control and Computer Engineering, Politecnico di Torino, Turin, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Department of Control and Computer Engineering,Turin,Italy","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Turin, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034581393","display_name":"Andrea Calimera","orcid":"https://orcid.org/0000-0001-5881-3811"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Andrea Calimera","raw_affiliation_strings":["Politecnico di Torino,Department of Control and Computer Engineering,Turin,Italy","Department of Control and Computer Engineering, Politecnico di Torino, Turin, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Department of Control and Computer Engineering,Turin,Italy","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"Department of Control and Computer Engineering, Politecnico di Torino, Turin, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005432629","display_name":"Enrico Macii","orcid":"https://orcid.org/0000-0001-9046-5618"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Enrico Macii","raw_affiliation_strings":["Politecnico di Torino,Interuniversity Department of Regional and Urban Studies and Planning,Turin,Italy","Interuniversity Department of Regional and Urban Studies and Planning, Politecnico di Torino, Turin, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Interuniversity Department of Regional and Urban Studies and Planning,Turin,Italy","institution_ids":["https://openalex.org/I177477856"]},{"raw_affiliation_string":"Interuniversity Department of Regional and Urban Studies and Planning, Politecnico di Torino, Turin, Italy","institution_ids":["https://openalex.org/I177477856"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011685545"],"corresponding_institution_ids":["https://openalex.org/I177477856"],"apc_list":null,"apc_paid":null,"fwci":0.1751,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56083707,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8434665203094482},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7440489530563354},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.552132248878479},{"id":"https://openalex.org/keywords/client-side","display_name":"Client-side","score":0.4841507077217102},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4618116617202759},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.42095381021499634},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.411321222782135},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.38740330934524536},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.354885995388031},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3288452923297882},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32005438208580017},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.301139235496521},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23858538269996643},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17087116837501526}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8434665203094482},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7440489530563354},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.552132248878479},{"id":"https://openalex.org/C202477664","wikidata":"https://www.wikidata.org/wiki/Q1352449","display_name":"Client-side","level":2,"score":0.4841507077217102},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4618116617202759},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.42095381021499634},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.411321222782135},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.38740330934524536},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.354885995388031},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3288452923297882},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32005438208580017},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.301139235496521},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23858538269996643},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17087116837501526}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/islped58423.2023.10244398","is_oa":false,"landing_page_url":"https://doi.org/10.1109/islped58423.2023.10244398","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2906869444","https://openalex.org/W2931743911","https://openalex.org/W2955425717","https://openalex.org/W2963163009","https://openalex.org/W2978001019","https://openalex.org/W2982083293","https://openalex.org/W2995502718","https://openalex.org/W3008983606","https://openalex.org/W3082305010","https://openalex.org/W3097217077","https://openalex.org/W3102836279","https://openalex.org/W3112330479","https://openalex.org/W3175867003","https://openalex.org/W3190461479","https://openalex.org/W3192232440","https://openalex.org/W3210673560","https://openalex.org/W3213781409","https://openalex.org/W3213975728","https://openalex.org/W4213171858","https://openalex.org/W4283390025","https://openalex.org/W4297775537","https://openalex.org/W4299301436","https://openalex.org/W4308095345","https://openalex.org/W4311165841","https://openalex.org/W6753937820","https://openalex.org/W6758096801","https://openalex.org/W6762718338","https://openalex.org/W6780010867"],"related_works":["https://openalex.org/W4214838992","https://openalex.org/W4302890120","https://openalex.org/W3006344745","https://openalex.org/W182679101","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2043669269","https://openalex.org/W4288264855","https://openalex.org/W2329175123"],"abstract_inverted_index":{"The":[0],"Inference-as-a-Service":[1],"(IaaS)":[2],"delivery":[3],"model":[4],"provides":[5],"users":[6],"access":[7,79],"to":[8,24,45,80,137],"pre-trained":[9],"deep":[10,73],"neural":[11,74,168],"networks":[12,169],"while":[13],"safeguarding":[14],"network":[15,75,125],"code":[16],"and":[17,96,152,176],"weights.":[18],"However,":[19],"IaaS":[20,50],"is":[21,51,134],"not":[22],"immune":[23],"security":[25],"threats,":[26],"like":[27],"side-channel":[28,100],"attacks":[29],"(SCAs),":[30],"that":[31,69,119],"exploit":[32],"unintended":[33],"information":[34],"leakage":[35],"from":[36,162],"the":[37,41,58,72,81,86,104,109,124,127,139,150,155,159],"physical":[38,78],"characteristics":[39],"of":[40,66,123,165,174],"target":[42,160],"device.":[43],"Exposure":[44],"such":[46],"threats":[47],"grows":[48],"when":[49],"deployed":[52],"on":[53,92,126,144],"distributed":[54],"computing":[55],"nodes":[56],"at":[57],"edge.":[59],"This":[60],"work":[61],"identifies":[62],"a":[63,93,115,163],"potential":[64],"vulnerability":[65],"low-power":[67],"CPUs":[68],"facilitates":[70],"stealing":[71],"architecture":[76,161],"without":[77],"hardware":[82],"or":[83],"interference":[84],"with":[85,170],"execution":[87],"flow.":[88],"Our":[89],"approach":[90],"relies":[91],"Dynamic":[94],"Voltage":[95],"Frequency":[97],"Scaling":[98],"(DVFS)":[99],"attack,":[101],"which":[102],"monitors":[103],"CPU":[105],"frequency":[106,128],"state":[107],"during":[108],"inference":[110],"stages.":[111],"Specifically,":[112],"we":[113],"introduce":[114],"dedicated":[116],"load-testing":[117],"methodology":[118],"imprints":[120],"distinguishable":[121],"signatures":[122],"traces.":[129],"A":[130],"machine":[131],"learning":[132],"classifier":[133],"then":[135],"used":[136],"infer":[138],"victim":[140],"architecture.":[141],"Experimental":[142],"results":[143],"two":[145],"commercial":[146],"ARM":[147],"Cortex-A":[148],"CPUs,":[149],"A72":[151],"A57,":[153],"demonstrate":[154],"attack":[156],"can":[157],"identify":[158],"pool":[164],"12":[166],"convolutional":[167],"an":[171],"average":[172],"accuracy":[173],"98.7%":[175],"92.4%":[177]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
