Search Results for author: Michael Davinroy

Found 3 papers, 3 papers with code

How to 0wn NAS in Your Spare Time

1 code implementation17 Feb 2020 Sanghyun Hong, Michael Davinroy, Yiğitcan Kaya, Dana Dachman-Soled, Tudor Dumitraş

This provides an incentive for adversaries to steal these novel architectures; when used in the cloud, to provide Machine Learning as a Service, the adversaries also have an opportunity to reconstruct the architectures by exploiting a range of hardware side channels.

Malware Detection Neural Architecture Search

Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks

1 code implementation ICLR 2019 Sanghyun Hong, Michael Davinroy, Yiǧitcan Kaya, Stuart Nevans Locke, Ian Rackow, Kevin Kulda, Dana Dachman-Soled, Tudor Dumitraş

Based on the extracted architecture attributes, we also demonstrate that an attacker can build a meta-model that accurately fingerprints the architecture and family of the pre-trained model in a transfer learning setting.

Transfer Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.