all InfoSec news
Side-channel attack analysis on in-memory computing architectures. (arXiv:2209.02792v1 [cs.CR])
Sept. 8, 2022, 1:20 a.m. | Ziyu Wang, Fan-hsuan Meng, Yongmo Park, Jason K. Eshraghian, Wei D. Lu
cs.CR updates on arXiv.org arxiv.org
In-memory computing (IMC) systems have great potential for accelerating
data-intensive tasks such as deep neural networks (DNNs). As DNN models are
generally highly proprietary, the neural network architectures become valuable
targets for attacks. In IMC systems, since the whole model is mapped on chip
and weight memory read can be restricted, the system acts as a "black box" for
customers. However, the localized and stationary weight and data patterns may
subject IMC systems to other attacks. In this paper, we …
analysis attack attack analysis channel computing memory side-channel side-channel attack
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
IT Security Manager
@ Teltonika | Vilnius/Kaunas, VL, LT
Security Officer - Part Time - Harrah's Gulf Coast
@ Caesars Entertainment | Biloxi, MS, United States
DevSecOps Full-stack Developer
@ Peraton | Fort Gordon, GA, United States
Cybersecurity Cooperation Lead
@ Peraton | Stuttgart, AE, United States
Cybersecurity Engineer - Malware & Forensics
@ ManTech | 201DU - Customer Site,Herndon, VA