COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Sponge Examples: Energy-Latency Attacks on Neural Networks
Sponge Examples: Energy-Latency Attacks on Neural NetworksAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Jack Hughes. The high energy costs of neural network training and inference led to the use of acceleration hardware such as GPUs and TPUs. While this enabled us to train large-scale neural networks in datacenters and deploy them on edge devices, the focus so far is on average-case performance. In this work, we introduce a novel threat vector against neural networks whose energy consumption or decision latency are critical. We show how adversaries can exploit carefully crafted , which are inputs designed to maximise energy consumption and latency. We mount two variants of this attack on established vision and language models, increasing energy consumption by a factor of 10 to 200. Our attacks can also be used to delay decisions where a network has critical real-time performance, such as in perception for autonomous vehicles. We demonstrate the portability of our malicious inputs across CPUs and a variety of hardware accelerator chips including GPUs, and an ASIC simulator. We conclude by proposing a defense strategy which mitigates our attack by shifting the analysis of energy consumption in hardware from an average-case to a worst-case perspective. https://arxiv.org/abs/2006.03463 RECORDING : Please note, this event will be recorded and will be available after the event for an indeterminate period under a CC BY -NC-ND license. Audience members should bear this in mind before joining the webinar or asking questions. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsCUES Type the title of a new list here Cambridge Global Food SecurityOther talksCancer Genetics Through the Lens of Mutational Signatures and the Two-Hit Hypothesis. POSTPONED - Annual General Meeting A V Hill Lecture - Kings and Queens of the Mountain: Studies of Extreme Physiology in Himalayan Sherpas Heritage Quest: An Archaeological Survey of the Veluwe based on Data Science and Citizen Science Democracy Requires Organized Collective Power Linking the global and the local: the double burden of child malnutrition in Jamaica, c. 1960–2020 |