{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:00:06Z","timestamp":1767772806421,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030987947"},{"type":"electronic","value":"9783030987954"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98795-4_4","type":"book-chapter","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T18:03:58Z","timestamp":1649354638000},"page":"72-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Artificial Neural Networks and Fault Injection Attacks"],"prefix":"10.1007","author":[{"given":"Shahin","family":"Tajik","sequence":"first","affiliation":[]},{"given":"Fatemeh","family":"Ganji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,8]]},"reference":[{"key":"4_CR1","unstructured":"Alam, M., et al.: Enhancing fault tolerance of neural networks for security-critical applications. arXiv preprint arXiv:1902.04560 (2019)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Alam, M.M., Tajik, S., Ganji, F., Tehranipoor, M., Forte, D.: RAM-jam: remote temperature and voltage fault attack on FPGAs using memory collisions. In: 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 48\u201355. IEEE (2019)","DOI":"10.1109\/FDTC.2019.00015"},{"issue":"2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. Proc. IEEE 94(2), 370\u2013382 (2006)","journal-title":"Proc. IEEE"},{"key":"4_CR4","unstructured":"Batina, L., Bhasin, S., Jap, D., Picek, S.: CSI NN: reverse engineering of neural network architectures through electromagnetic side channel. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 515\u2013532 (2019)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Bolt, G.: Fault models for artificial neural networks. In: [Proceedings] 1991 IEEE International Joint Conference on Neural Networks, pp. 1373\u20131378. IEEE (1991)","DOI":"10.1109\/IJCNN.1991.170591"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Breier, J., Hou, X., Jap, D., Ma, L., Bhasin, S., Liu, Y.: Practical fault attack on deep neural networks. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2204\u20132206. ACM (2018)","DOI":"10.1145\/3243734.3278519"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Breier, J., Jap, D., Hou, X., Bhasin, S., Liu, Y.: SNIFF: reverse engineering of neural networks with fault attacks. arXiv preprint arXiv:2002.11021 (2020)","DOI":"10.1109\/TR.2021.3105697"},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1145\/2654822.2541967","volume":"42","author":"T Chen","year":"2014","unstructured":"Chen, T., et al.: DianNao: a small-footprint high-throughput accelerator for ubiquitous machine-learning. ACM SIGARCH Comput. Archit. News 42(1), 269\u2013284 (2014)","journal-title":"ACM SIGARCH Comput. Archit. News"},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/3007787.3001177","volume":"44","author":"YH Chen","year":"2016","unstructured":"Chen, Y.H., Emer, J., Sze, V.: Eyeriss: a spatial architecture for energy-efficient dataflow for convolutional neural networks. ACM SIGARCH Comput. Archit. News 44(3), 367\u2013379 (2016)","journal-title":"ACM SIGARCH Comput. Archit. News"},{"issue":"3","key":"4_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/3007787.3001140","volume":"44","author":"P Chi","year":"2016","unstructured":"Chi, P., et al.: PRIME: a novel processing-in-memory architecture for neural network computation in ReRAM-based main memory. ACM SIGARCH Comput. Archit. News 44(3), 27\u201339 (2016)","journal-title":"ACM SIGARCH Comput. Archit. News"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Dubey, A., Cammarota, R., Aysu, A.: MaskedNet: the first hardware inference engine aiming power side-channel protection. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 197\u2013208. IEEE (2020)","DOI":"10.1109\/HOST45689.2020.9300276"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Gnad, D.R., Oboril, F., Tahoori, M.B.: Voltage drop-based fault attacks on FPGAs using valid bitstreams. In: 27th International Conference on Field Programmable Logic and Applications, pp. 1\u20137. IEEE (2017)","DOI":"10.23919\/FPL.2017.8056840"},{"key":"4_CR13","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"issue":"3","key":"4_CR14","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/3007787.3001163","volume":"44","author":"S Han","year":"2016","unstructured":"Han, S., Liu, X., Mao, H., Pu, J., Pedram, A., Horowitz, M.A., Dally, W.J.: EIE: efficient inference engine on compressed deep neural network. ACM SIGARCH Comput. Archit. News 44(3), 243\u2013254 (2016)","journal-title":"ACM SIGARCH Comput. Archit. News"},{"key":"4_CR15","unstructured":"Hong, S., Frigo, P., Kaya, Y., Giuffrida, C., Dumitra\u015f, T.: Terminal brain damage: exposing the graceless degradation in deep neural networks under hardware fault attacks. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 497\u2013514 (2019)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Hou, X., Breier, J., Jap, D., Ma, L., Bhasin, S., Liu, Y.: Security evaluation of deep neural network resistance against laser fault injection. In: 2020 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/IPFA49335.2020.9261013"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Hua, W., Zhang, Z., Suh, G.E.: Reverse engineering convolutional neural networks through side-channel information leaks. In: 2018 55th ACM\/ESDA\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/DAC.2018.8465773"},{"key":"4_CR18","unstructured":"Jouppi, N.: Google supercharges machine learning tasks with TPU custom chip. Google Blog May 18, 1 (2016)"},{"key":"4_CR19","unstructured":"Wiggers, K.: Apple\u2019s A12 Bionic chip runs Core ML apps up to 9 times faster. Technical report. https:\/\/venturebeat.com\/2018\/09\/12\/apples-a12-bionic-chip-run-core-ml-apps-up-to-9-times-faster\/"},{"key":"4_CR20","unstructured":"Kenjar, Z., Frassetto, T., Gens, D., Franz, M., Sadeghi, A.R.: V0LTpwn: attacking x86 processor integrity from software. In: 29th USENIX Security Symposium (USENIX Security 2020) (2020)"},{"key":"4_CR21","unstructured":"Kerckhoffs, A.: La cryptographie militaire, ou, Des chiffres usit\u00e9s en temps de guerre: avec un nouveau proc\u00e9d\u00e9 de d\u00e9chiffrement applicable aux syst\u00e8mes \u00e0 double clef. Librairie militaire de L, Baudoin (1883)"},{"issue":"2","key":"4_CR22","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/3296957.3173176","volume":"53","author":"H Kwon","year":"2018","unstructured":"Kwon, H., Samajdar, A., Krishna, T.: MAERI: enabling flexible dataflow mapping over DNN accelerators via reconfigurable interconnects. ACM SIGPLAN Not. 53(2), 461\u2013475 (2018)","journal-title":"ACM SIGPLAN Not."},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1109\/TIFS.2020.3046858","volume":"16","author":"W Liu","year":"2020","unstructured":"Liu, W., Chang, C.H., Zhang, F.: Stealthy and robust glitch injection attack on deep learning accelerator for target with variational viewpoint. IEEE Trans. Inf. Forensics Secur. 16, 1928\u20131942 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Liu, W., Chang, C.H., Zhang, F., Lou, X.: Imperceptible misclassification attack on deep learning accelerator by glitch injection. In: 2020 57th ACM\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/DAC18072.2020.9218577"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Liu, Y., Wei, L., Luo, B., Xu, Q.: Fault injection attack on deep neural network. In: IEEE\/ACM International Conference on Computer-Aided Design, pp. 131\u2013138 (2017)","DOI":"10.1109\/ICCAD.2017.8203770"},{"issue":"8","key":"4_CR26","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1109\/TNNLS.2012.2199517","volume":"23","author":"HR Mahdiani","year":"2012","unstructured":"Mahdiani, H.R., Fakhraie, S.M., Lucas, C.: Relaxed fault-tolerant hardware implementation of neural networks in the presence of multiple transient errors. IEEE Trans. Neural Netw. Learn. Syst. 23(8), 1215\u20131228 (2012)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"4_CR27","unstructured":"Mehrotra, K., Mohan, C.K., Ranka, S., Chiu, C.T.: Fault tolerance of neural networks. Technical report, Syracuse Univ NY School of Computer and Information Science (1994)"},{"key":"4_CR28","unstructured":"Newsroom, A.: The future is here: iPhone X (2017). https:\/\/www.apple.com\/newsroom\/2017\/09\/the-future-is-here-iphone-x\/. Accessed 8 Mar 2022"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Provelengios, G., Holcomb, D., Tessier, R.: Characterizing power distribution attacks in multi-user FPGA environments. In: 2019 29th International Conference on Field Programmable Logic and Applications (FPL), pp. 194\u2013201. IEEE (2019)","DOI":"10.1109\/FPL.2019.00038"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Provelengios, G., Holcomb, D., Tessier, R.: Power wasting circuits for cloud FPGA attacks. 2020 30th International Conference on Field Programmable Logic and Applications (FPL) (2020)","DOI":"10.1109\/FPL50879.2020.00046"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Rakin, A.S., He, Z., Fan, D.: Bit-flip attack: crushing neural network with progressive bit search. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1211\u20131220 (2019)","DOI":"10.1109\/ICCV.2019.00130"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Rakin, A.S., He, Z., Fan, D.: TBT: targeted neural network attack with bit trojan. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13198\u201313207 (2020)","DOI":"10.1109\/CVPR42600.2020.01321"},{"key":"4_CR33","unstructured":"Review, A.: Tesla hardware 3 (full self-driving computer) detailed (2019). https:\/\/www.autopilotreview.com\/tesla-custom-ai-chips-hardware-3\/. Accessed 8 Mar 2022"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Salami, B., et al.: An experimental study of reduced-voltage operation in modern FPGAs for neural network acceleration. In: 2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 138\u2013149. IEEE (2020)","DOI":"10.1109\/DSN48063.2020.00032"},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Salami, B., Unsal, O.S., Kestelman, A.C.: On the resilience of RTL NN accelerators: fault characterization and mitigation. In: 2018 30th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), pp. 322\u2013329. IEEE (2018)","DOI":"10.1109\/CAHPC.2018.8645906"},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Sequin, C.H., Clay, R.: Fault tolerance in artificial neural networks. In: 1990 IJCNN International Joint Conference on Neural Networks, pp. 703\u2013708. IEEE (1990)","DOI":"10.1109\/IJCNN.1990.137651"},{"issue":"4","key":"4_CR37","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"4_CR38","unstructured":"Tang, A., Sethumadhavan, S., Stolfo, S.: CLKSCREW: exposing the perils of security-oblivious energy management. In: 26th USENIX Security Symposium (USENIX Security 2017), pp. 1057\u20131074 (2017)"},{"key":"4_CR39","doi-asserted-by":"publisher","first-page":"17322","DOI":"10.1109\/ACCESS.2017.2742698","volume":"5","author":"C Torres-Huitzil","year":"2017","unstructured":"Torres-Huitzil, C., Girau, B.: Fault and error tolerance in neural networks: a review. IEEE Access 5, 17322\u201317341 (2017)","journal-title":"IEEE Access"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Wei, L., Luo, B., Li, Y., Liu, Y., Xu, Q.: I know what you see: power side-channel attack on convolutional neural network accelerators. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 393\u2013406 (2018)","DOI":"10.1145\/3274694.3274696"},{"key":"4_CR41","unstructured":"Yan, M., Fletcher, C.W., Torrellas, J.: Cache telepathy: leveraging shared resource attacks to learn $$\\{$$DNN$$\\}$$ architectures. In: 29th USENIX Security Symposium (USENIX Security 2020), pp. 2003\u20132020 (2020)"},{"key":"4_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, J., Rangineni, K., Ghodsi, Z., Garg, S.: Thundervolt: enabling aggressive voltage underscaling and timing error resilience for energy efficient deep learning accelerators. In: Proceedings of the 55th Annual Design Automation Conference, pp. 1\u20136 (2018)","DOI":"10.1145\/3195970.3196129"},{"key":"4_CR43","doi-asserted-by":"crossref","unstructured":"Zhao, P., Wang, S., Gongye, C., Wang, Y., Fei, Y., Lin, X.: Fault sneaking attack: a stealthy framework for misleading deep neural networks. In: 2019 56th ACM\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2019)","DOI":"10.1145\/3316781.3317825"}],"container-title":["Lecture Notes in Computer Science","Security and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98795-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T18:07:45Z","timestamp":1649354865000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98795-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030987947","9783030987954"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98795-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}