Vulnerability Assessment Method

Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels — Attacks and Defenses

Authors: Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan | Published: 2021-03-26
Model Protection Methods
Vulnerability Assessment Method
Defense Mechanism

A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks

Authors: Yu Zhuang, Khalid T. Mursi, Li Gaoxiang | Published: 2021-03-24
Optimization Methods
Vulnerability Assessment Method
Defense Mechanism

DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles

Authors: Huanrui Yang, Jingyang Zhang, Hongliang Dong, Nathan Inkawhich, Andrew Gardner, Andrew Touchet, Wesley Wilkes, Heath Berry, Hai Li | Published: 2020-09-30 | Updated: 2020-10-18
Robustness Improvement Method
Adversarial Example
Vulnerability Assessment Method

SoK: Certified Robustness for Deep Neural Networks

Authors: Linyi Li, Tao Xie, Bo Li | Published: 2020-09-09 | Updated: 2023-04-12
Formal Verification
Deep Learning Technology
Vulnerability Assessment Method

Towards Memory Safe Python Enclave for Security Sensitive Computation

Authors: Huibo Wang, Mingshen Sun, Qian Feng, Pei Wang, Tongxin Li, Yu Ding | Published: 2020-05-12
Security Assurance
Privacy Assessment
Vulnerability Assessment Method

Estimating g-Leakage via Machine Learning

Authors: Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida | Published: 2020-05-09 | Updated: 2021-11-24
Bayesian Classification
Role of Machine Learning
Vulnerability Assessment Method

TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems

Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09
Attack Evaluation
Vulnerability Assessment Method
Defense Method

Challenges in Forecasting Malicious Events from Incomplete Data

Authors: Nazgol Tavabi, Andrés Abeliuk, Negar Mokhberian, Jeremy Abramson, Kristina Lerman | Published: 2020-04-06
Security Analysis
Dataset evaluation
Vulnerability Assessment Method

Artificial Intelligence Techniques for Security Vulnerability Prevention

Authors: Steve Kommrusch | Published: 2019-12-14
Machine Learning Technology
Vulnerability Assessment Method
Automated Vulnerability Remediation

Certifiable Robustness to Graph Perturbations

Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2019-10-31 | Updated: 2019-12-19
Graph Neural Network
Attack Method
Vulnerability Assessment Method