{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:46:44Z","timestamp":1768016804653,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T00:00:00Z","timestamp":1715040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,7]]},"DOI":"10.1145\/3637543.3652877","type":"proceedings-article","created":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T06:19:21Z","timestamp":1719814761000},"page":"63-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Model theft attack against a tinyML application running on an Ultra-Low-Power Open-Source SoC"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4671-5064","authenticated-orcid":false,"given":"Antonio","family":"Porsia","sequence":"first","affiliation":[{"name":"Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2040-9762","authenticated-orcid":false,"given":"Annachiara","family":"Ruospo","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7042-295X","authenticated-orcid":false,"given":"Ernesto","family":"Sanchez","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Turin, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Michael Bechtel QiTao Weng and Heechul Yun. 2022. DeepPicarMicro: Applying TinyML to Autonomous Cyber Physical Systems. arXiv:2208.11212 [cs.LG]","DOI":"10.1109\/RTCSA55878.2022.00019"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/PATMOS.2017.8106976"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100461"},{"key":"e_1_3_2_1_4_1","unstructured":"ETSI SAI ISG. 2020. Securing Artifical Intelligence (SAI); Problem Statement. Group Report DGR\/SAI-004. ETSI."},{"key":"e_1_3_2_1_5_1","volume-title":"Securing Artifical Intelligence (SAI)","author":"ETSI SAI ISG.","unstructured":"ETSI SAI ISG. 2022. Securing Artifical Intelligence (SAI); The role of hardware in security of AI. Group Report DGR\/SAI-006. ETSI."},{"key":"e_1_3_2_1_6_1","unstructured":"ETSI SAI ISG. 2023. Securing Artifical Intelligence (SAI); Artificial Intelligence Computing Platform Security Framework. Group Report DGR\/SAI-006. ETSI."},{"key":"e_1_3_2_1_7_1","volume-title":"Thomas Christoph M\u00fcller, Miguel Pe\u00f3n-Quir\u00f3s, and David Atienza.","author":"Machetti Simone","year":"2024","unstructured":"Simone Machetti, Pasquale Davide Schiavone, Thomas Christoph M\u00fcller, Miguel Pe\u00f3n-Quir\u00f3s, and David Atienza. 2024. X-HEEP: An Open-Source, Configurable and Extendible RISC-V Microcontroller for the Exploration of Ultra-Low-Power Edge Accelerators. arXiv:2401.05548 [cs.AR]"},{"key":"e_1_3_2_1_8_1","volume-title":"OWASP Machine Learning Security Top Ten. Retrieved","author":"Machine Learning Security Top OWASP","year":"2024","unstructured":"OWASP Machine Learning Security Top Ten 2023. OWASP Machine Learning Security Top Ten. Retrieved March 1, 2024 from https:\/\/mltop10.info"},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Microcontrollers TensorFlow","year":"2024","unstructured":"TensorFlow Lite for Microcontrollers 2024. TensorFlow Lite for Microcontrollers. Retrieved February 19, 2024 from https:\/\/www.tensorflow.org\/lite\/microcontrollers"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved Feburary 19","author":"Foundation ML","year":"2024","unstructured":"tinyML Foundation 2024. tinyML Foundation. Retrieved Feburary 19, 2024 from https:\/\/www.tinyml.org"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503823.3503836"},{"key":"e_1_3_2_1_12_1","volume-title":"I: User-Level ISA, Document Version 20191213","author":"Waterman Andrew","year":"2019","unstructured":"Andrew Waterman and Krste Asanovi\u0107 (Eds.). 2019. The RISC-V Instruction Set Manual, Volume I: User-Level ISA, Document Version 20191213. RISC-V Foundation."},{"key":"e_1_3_2_1_13_1","unstructured":"Andrew Waterman Krste Asanovi\u0107 and John Hauser (Eds.). 2021. The RISC-V Instruction Set Manual Volume II: Privileged Architecture Document Version 20211203. RISC-V International."}],"event":{"name":"CF '24: 21st ACM International Conference on Computing Frontiers","location":"Ischia Italy","acronym":"CF '24","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["Proceedings of the 21st ACM International Conference on Computing Frontiers: Workshops and Special Sessions"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637543.3652877","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637543.3652877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:46:39Z","timestamp":1755913599000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637543.3652877"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,7]]},"references-count":13,"alternative-id":["10.1145\/3637543.3652877","10.1145\/3637543"],"URL":"https:\/\/doi.org\/10.1145\/3637543.3652877","relation":{},"subject":[],"published":{"date-parts":[[2024,5,7]]},"assertion":[{"value":"2024-07-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}