close By using this website, you agree to the use of cookies. Detailed information on the use of cookies on this website can be obtained on OneSpin's Privacy Policy. At this point you may also object to the use of cookies and adjust the browser settings accordingly.

Using AI Data For Security

By Ann Steffora-Mutschler, Semiconductor Engineering

Artificial intelligence is migrating from the cloud to IoT edge devices. Now the question is how to apply that same technology to protect data and identify abnormal activity in those devices and the systems connected to them.

[…]

Semiconductor Engineering logo

Further, providers of semiconductor IP are still struggling with detecting security vulnerabilities in ‘traditional’ hardware, pointed out Sergio Marchese, technical marketing manager at OneSpin Solutions. “For example, rowhammer attacks are well understood, and there are several defensive techniques, including memory protection with error correcting code (ECC) modules. A couple of months back, I read an article about how some academics found a way to get around ECC and inject three consecutive bit-flips into memory.When it comes to AI and hardware for CNNs and ML algorithms, we are just beginning to understand vulnerabilities. Researches demonstrated black-box and white-box, where detail on the internal structure of the CNN are known, strategies to insert errors, invisible to the human eye, in very specific places in an image that results in completely wrong classification.”

Back

Related Links