Attacks by Hardware Trojans on Neural Networks

Attacks by Hardware Trojans on Neural Networks

Naveenkumar R., N.M. Sivamangai, P. Malin Bruntha, V. Govindaraj, Ahmed A. Elngar
Copyright: © 2023 |Pages: 28
ISBN13: 9781668465967|ISBN10: 1668465965|ISBN13 Softcover: 9781668465974|EISBN13: 9781668465981
DOI: 10.4018/978-1-6684-6596-7.ch010
Cite Chapter Cite Chapter

MLA

Naveenkumar R., et al. "Attacks by Hardware Trojans on Neural Networks." Neuromorphic Computing Systems for Industry 4.0, edited by S. Dhanasekar, et al., IGI Global, 2023, pp. 261-288. https://doi.org/10.4018/978-1-6684-6596-7.ch010

APA

Naveenkumar R., Sivamangai, N., Bruntha, P. M., Govindaraj, V., & Elngar, A. A. (2023). Attacks by Hardware Trojans on Neural Networks. In S. Dhanasekar, K. Sagayam, S. Vijh, V. Tyagi, & A. Norta (Eds.), Neuromorphic Computing Systems for Industry 4.0 (pp. 261-288). IGI Global. https://doi.org/10.4018/978-1-6684-6596-7.ch010

Chicago

Naveenkumar R., et al. "Attacks by Hardware Trojans on Neural Networks." In Neuromorphic Computing Systems for Industry 4.0, edited by S. Dhanasekar, et al., 261-288. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-6596-7.ch010

Export Reference

Mendeley
Favorite

Abstract

The security aspects of neural networks (NN) have become a crucial and appropriate theme for basic research as a result of recent developments in neural networks and their use in deep learning techniques. In this research, the authors examine the security issues and potential solutions in computing hardware for deep neural networks (DNN). The latest hardware-based attacks against DNN are then described, with an emphasis on fault injection (FI), hardware Trojan (HT) insertion, and side-channel analysis (SCA). This chapter presents the various security issues in hardware-based attacks and security concerns in the hardware trojan (HT) and side-channel analysis are focused. Moreover, discussed the countermeasure for the hardware trojan and side channel attacks (SCA) is in neural networks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.