no code implementations • 17 Apr 2023 • Alexander Warnecke, Julian Speith, Jan-Niklas Möller, Konrad Rieck, Christof Paar
In this paper, we challenge this assumption and introduce a backdoor attack that completely resides within a common hardware accelerator for machine learning.
no code implementations • 1 Mar 2017 • Shahrzad Keshavarz, Christof Paar, Daniel Holcomb
However, if an adversary has pre-existing knowledge about the set of functions that are viable for an application, random camouflaging of gates will not obfuscate the function well.
Cryptography and Security