{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:03:30Z","timestamp":1742951010415,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031544088"},{"type":"electronic","value":"9783031544095"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54409-5_13","type":"book-chapter","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T06:08:12Z","timestamp":1708582092000},"page":"256-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Like an\u00a0Open Book? Read Neural Network Architecture with\u00a0Simple Power Analysis on\u00a032-Bit Microcontrollers"],"prefix":"10.1007","author":[{"given":"Rapha\u00ebl","family":"Joud","sequence":"first","affiliation":[]},{"given":"Pierre-Alain","family":"Mo\u00ebllic","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Ponti\u00e9","sequence":"additional","affiliation":[]},{"given":"Jean-Baptiste","family":"Rigaud","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,23]]},"reference":[{"unstructured":"Batina, L., Jap, D., Bhasin, S., Picek, S.: CSI NN: reverse engineering of neural network architectures through electromagnetic side channel. In: 28th USENIX Security Symposium. USENIX Association (2019)","key":"13_CR1"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-030-56877-1_7","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"N Carlini","year":"2020","unstructured":"Carlini, N., Jagielski, M., Mironov, I.: Cryptanalytic extraction of neural\u00a0network models. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12172, pp. 189\u2013218. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56877-1_7"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-030-81645-2_7","volume-title":"Applied Cryptography and Network Security Workshops","author":"\u0141 Chmielewski","year":"2021","unstructured":"Chmielewski, \u0141, Weissbart, L.: On reverse engineering neural network implementation on GPU. In: Zhou, J., et al. (eds.) ACNS 2021. LNCS, vol. 12809, pp. 96\u2013113. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81645-2_7"},{"unstructured":"Duddu, V., Samanta, D., Rao, D.V., Balas, V.E.: Stealing neural networks via timing side channels. arXiv preprint arXiv:1812.11720 (2018)","key":"13_CR4"},{"doi-asserted-by":"crossref","unstructured":"Gongye, C., Fei, Y., Wahl, T.: Reverse-engineering deep neural networks using floating-point timing side-channels. In: 57th ACM\/IEEE Design Automation Conference (DAC). IEEE (2020)","key":"13_CR5","DOI":"10.1109\/DAC18072.2020.9218707"},{"doi-asserted-by":"crossref","unstructured":"Hector, K., Moellic, P.-A., Dumont, M., Dutertre, J.-M.: Fault injection and safe-error attack for extraction of embedded neural network models. arXiv preprint arXiv:2308.16703 (2023)","key":"13_CR6","DOI":"10.1007\/978-3-031-54129-2_38"},{"unstructured":"Jagielski, M., Carlini, N., Berthelot, D., Kurakin, A., Papernot, N.: High accuracy and high fidelity extraction of neural networks. In: Proceedings of the 29th USENIX Conference on Security Symposium (2020)","key":"13_CR7"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-031-25319-5_3","volume-title":"Smart Card Research and Advanced Applications","author":"R Joud","year":"2023","unstructured":"Joud, R., Mo\u00ebllic, P.A., Ponti\u00e9, S., Rigaud, J.B.: A practical introduction to side-channel extraction of deep neural network parameters. In: Buhan, I., Schneider, T. (eds.) CARDIS 2022. LNCS, vol. 13820, pp. 45\u201365. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-25319-5_3"},{"unstructured":"Lai, L., Suda, N., Chandra, V.: CMSIS-NN: efficient neural network kernels for arm cortex-M CPUs. arXiv preprint arXiv:1801.06601 (2018)","key":"13_CR9"},{"unstructured":"Lin, J., Chen, W.M., Lin, Y., Gan, C., Han, S., et al.: MCUNet: tiny deep learning on IoT devices. In: Advances in Neural Information Processing Systems, vol. 33 (2020)","key":"13_CR10"},{"doi-asserted-by":"crossref","unstructured":"Luo, Y., Duan, S., Gongye, C., Fei, Y., Xu, X.: NNReArch: a tensor program scheduling framework against neural network architecture reverse engineering. In: IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM). IEEE (2022)","key":"13_CR11","DOI":"10.1109\/FCCM53951.2022.9786112"},{"unstructured":"Ma, J.: A higher-level Neural Network library on Microcontrollers (NNoM) (2020)","key":"13_CR12"},{"doi-asserted-by":"crossref","unstructured":"Maji, S., Banerjee, U., Chandrakasan, A.P.: Leaky nets: recovering embedded neural network models and inputs through simple power and timing side-channels-attacks and defenses. IEEE Internet Things J. 8(15) (2021)","key":"13_CR13","DOI":"10.1109\/JIOT.2021.3061314"},{"key":"13_CR14","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-031-27440-4_41","volume-title":"Intelligent Systems Design and Applications","author":"B Nguyen","year":"2022","unstructured":"Nguyen, B., Mo\u00ebllic, P.A., Blayac, S.: Evaluation of convolution primitives for embedded neural networks on 32-bit microcontrollers. In: Abraham, A., Pllana, S., Casalino, G., Ma, K., Bajaj, A. (eds.) ISDA 2022. LNNS, vol. 646, pp. 427\u2013437. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-27440-4_41"},{"doi-asserted-by":"crossref","unstructured":"Orekondy, T., Schiele, B., Fritz, M.: Knockoff nets: stealing functionality of black-box models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2019)","key":"13_CR15","DOI":"10.1109\/CVPR.2019.00509"},{"doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Proceedings of the ACM on Asia conference on Computer and Communications Security (2017)","key":"13_CR16","DOI":"10.1145\/3052973.3053009"},{"doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Sinha, A., Wellman, M.P.: SoK: security and privacy in machine learning. In: 2018 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 399\u2013414. IEEE (2018)","key":"13_CR17","DOI":"10.1109\/EuroSP.2018.00035"},{"doi-asserted-by":"crossref","unstructured":"Rakin, A.S., Chowdhuryy, M.H.I., Yao, F., Fan, D.: DeepSteal: advanced model extractions leveraging efficient weight stealing in memories. In: IEEE Symposium on Security and Privacy (SP). IEEE (2022)","key":"13_CR18","DOI":"10.1109\/SP46214.2022.9833743"},{"unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: USENIX Security Symposium, vol. 16 (2016)","key":"13_CR19"},{"doi-asserted-by":"crossref","unstructured":"Xiang, Y., Chen, Z., Chen, Z., et al.: Open DNN box by power side-channel attack. IEEE Trans. Circ. Syst. II: Express Briefs 67(11) (2020)","key":"13_CR20","DOI":"10.1109\/TCSII.2020.2973007"},{"doi-asserted-by":"crossref","unstructured":"Yli-M\u00e4yry, V., Ito, A., Homma, N., Bhasin, S., Jap, D.: Extraction of binarized neural network architecture and secret parameters using side-channel information. In: IEEE International Symposium on Circuits and Systems (ISCAS). IEEE (2021)","key":"13_CR21","DOI":"10.1109\/ISCAS51556.2021.9401626"},{"doi-asserted-by":"crossref","unstructured":"Yu, H., Ma, H., Yang, K., Zhao, Y., Jin, Y.: DeepEM: deep neural networks model recovery through EM side-channel information leakage. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE (2020)","key":"13_CR22","DOI":"10.1109\/HOST45689.2020.9300274"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54409-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T05:51:06Z","timestamp":1731390666000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54409-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031544088","9783031544095"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54409-5_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"23 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CARDIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Card Research and Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cardis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}