Internships on hardware/microarchitectural security of deep/machine learning implementations
Role details
Job location
Tech stack
Job description
Depending on the background of the candidates, the internships can take different directions, such as DNN implementations in FPGA or microcontrollers using AxC techniques, evaluation of DNN side-channel security, and implementation and evaluation of countermeasures.
Requirements
Autre diplôme apprécié : M1/M2 students (4thor /5th year Eng.) in Computer/Electrical Engineering, Computer Science, Embedded Systems, Electronics/Microelectronics, * Side-channel attacks and evaluation methodologies of secure implementations, cryptanalysis;
-
HW or SW implementations of DNNs (FPGAs, microcontrollers, other accelerators/systems);
-
Other HW/SW security background (e.g., hardware-secure implementation of cryptographic algorithms);
-
Design for FPGAs and hands-on experience in prototyping and implementations.
Other interesting technical skills include:
- Programming in C/C++/Python
- Use of Linux/Git as a development environment
- Good use of laboratory instruments (oscilloscopes, power supplies, etc.)
- ML/AI frameworks (TinyML, PyTorch, TensorFlow, TFLite...)
Languages: You can speak, write, and read English at a professional level (french language is not required).
Benefits & conditions
[1] S. Mittal, H. Gupta, and S. Srivastava. "A Survey on Hardware Security of DNN Models and Accelerators". J. Syst. Archit. 117 2021, p. 102163. doi: 10.1016/j.sysarc.2021.102163. [2] V. Meyers, D. Gnad, and M. Tahoori. "Active and Passive Physical Attacks on Neural Network Accelerators". IEEE Design & Test 2023, pp. 1-1. doi: 10.1109/MDAT.2023.3253603. [3] M. Méndez Real and R. Salvador. "Physical Side-Channel Attacks on Embedded Neural Networks: A Survey". Appl. Sci. 11 15, 2021, p. 6790. doi: 10.3390/app11156790. [4] P. Horváth, D. Lauret, Z. Liu, and L. Batina. "SoK: Neural Network Extraction Through Physical Side Channels". 33rd USENIX Security Symposium (USENIX Security 24). 2024, pp. 3403-3422. [5] M. Isakov, V. Gadepally, K. M. Gettings, and M. A. Kinsy. "Survey of Attacks and Defenses on Edge-Deployed Neural Networks". IEEE HPEC. 2019, pp. 1-8. doi: 10.1109/HPEC.2019.8916519. [6] L. Batina, S. Bhasin, D. Jap, and S. Picek. "CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel". USENIX Security Symp. 2019, pp. 515-532. [7] R. Joud, P.-A. Moëllic, S. Pontié, and J.-B. Rigaud. "A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters". Smart Card Research and Advanced Applications. Ed. by I. Buhan and T. Schneider. Cham: Springer International Publishing, 2023, pp. 45-65. doi: 10.1007/978-3-031-25319-5_3. [8] R. Joud, P.-A. Moëllic, S. Pontié, and J.-B. Rigaud. "Like an Open Book? Read Neural Network Architecture with Simple Power Analysis on 32-Bit Microcontrollers". Smart Card Research and Advanced Applications. Ed. by S. Bhasin and T. Roche. Cham: Springer Nature Switzerland, 2024, pp. 256-276. doi: 10.1007/978- 3- 031- 54409-5_13. [9] Y. Zhang, R. Yasaei, H. Chen, Z. Li, and M. A. A. Faruque. "Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis". IEEE Trans. Inf. Forensics Secur. 16 2021, pp. 4377-4388. doi: 10.1109/TIFS. 2021.3106169. [10] S. Moini, S. Tian, D. Holcomb, J. Szefer, and R. Tessier. "Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs". IEEE J. Emerg. Sel. Top. Circuits Syst. 11.2 2021, pp. 357-370. doi: 10.1109/JETCAS.2021. 3074608.
Mission confiée
These internships are framed in the ANR JCJC project ATTILA1 (young investigators' grant from the French national research agency). The objectives are to investigate the susceptibility of DL-based systems to side-channel attacks and to design SCA-secure DL implementations. In these internships, we are interested in both local SCA attacks on edge devices, highly exposed to attackers [5-8], and remote SCA attacks on cloud-based DL implementations [9, 10]. The internships cover both software implementations (e.g., in microcontrollers) and hardware implementations (e.g., accelerators in FPGA) of DL algorithms.
Although the main focus is on physical side-channel vulnerabilities (e.g., power consumption or EM emanations), we are open to exploring microarchitectural timing side channels exposing, e.g., cache, DRAM, or other processor microarchitecture vulnerabilities.
This position offers a good opportunity to discover an emerging topic and gain skills to help you complete a PhD in the field of (AI) hardware/microarchitecture security.