Categories: Techno

Scientists find key vulnerability in AI security

Researchers have uncovered a serious security vulnerability in neural networks, showing that artificial intelligence models can be stolen by analyzing the electromagnetic signals of the devices they run on. The technique, demonstrated on a Google Edge TPU, allows you to recreate the architecture and functionality of an AI model with 99.91% accuracy, even without prior knowledge of its characteristics, writes SciTechDaily.

The method is based on monitoring changes in the electromagnetic field while the model is running. The collected signals are compared with a database containing signatures of other models. Thus, researchers recreate the AI ​​layers step by step, using the electromagnetic «signatures» of each of them. This allows to create a copy of the model without direct access to it.

The technique works on many devices provided that the attacker has access to the device while the AI ​​model is running and to another device with similar characteristics. The demonstration used a commercial Google Edge TPU chip, which is widely used in end-user devices.

The vulnerability not only compromises intellectual property, but it can also expose model vulnerabilities, allowing attackers to launch attacks. The authors urge developers to implement safeguards to protect their models from such attacks.

The work, which was supported by the US National Science Foundation, was presented at the Cryptographic Hardware and Embedded Systems Conference. The researchers also notified Google of the vulnerability.

Natasha Kumar

Natasha Kumar has been a reporter on the news desk since 2018. Before that she wrote about young adolescence and family dynamics for Styles and was the legal affairs correspondent for the Metro desk. Before joining The Times Hub, Natasha Kumar worked as a staff writer at the Village Voice and a freelancer for Newsday, The Wall Street Journal, GQ and Mirabella. To get in touch, contact me through my natasha@thetimeshub.in 1-800-268-7116

Share
Published by
Natasha Kumar

Recent Posts

American developers have presented innovative UAV COYOTE LE SR that runs from the helicopter

< IMG SRC = "/Uploads/Blogs/C8/B4/IB-FRH3LJBHA_C9316240.jpg" Alt = "American developers presented innovative UAVA Coyote Le Sr,…

1 minute ago

Shahmed's new tactics: The analyst suggested a way to protect the cities to totally protect

< img src = "/uploads/blogs/3c/e9/ib-frh3k0gQu_7c6fc931.jpg" Alt = "New tactics & quot; Shahmed & quot; quot;…

1 minute ago

Microsoft believes that AI can reduce the level of critical thinking

< img src = "/uploads/blogs/8e/afrgop0T5O_6240df4a.jpg" Alt = "Microsoft believes that AI can reduce the level…

1 minute ago

The man by the deception has made 7 million who belonged to the family of the dead military

< IMG SRC = "/Uploads/Blogs/2b/33/IB-FRGOL5E57_7FDB35A7.jpg" Alt = "Man by deception made 7 million who belonged…

1 minute ago

The man was engaged in the sale of psychotrop through Telegram – as he was punished

< IMG SRC = "/Uploads/Blogs/C3/1C/IB-FRH7864F3_8B7A3777B.PNG" Alt = "Man was engaged in the sale < p…

2 hours ago

Named the best Samsung smartphones in 2025 under different budget and requests

< IMG SRC = "/Uploads/Blogs/31/B7/IB-FRH35T9GM_5237C6FC.jpg" Alt = "Named the best smartphones Samsung in 2025 under…

4 hours ago