Categories: Techno

Scientists find key vulnerability in AI security

Researchers have uncovered a serious security vulnerability in neural networks, showing that artificial intelligence models can be stolen by analyzing the electromagnetic signals of the devices they run on. The technique, demonstrated on a Google Edge TPU, allows you to recreate the architecture and functionality of an AI model with 99.91% accuracy, even without prior knowledge of its characteristics, writes SciTechDaily.

The method is based on monitoring changes in the electromagnetic field while the model is running. The collected signals are compared with a database containing signatures of other models. Thus, researchers recreate the AI ​​layers step by step, using the electromagnetic «signatures» of each of them. This allows to create a copy of the model without direct access to it.

The technique works on many devices provided that the attacker has access to the device while the AI ​​model is running and to another device with similar characteristics. The demonstration used a commercial Google Edge TPU chip, which is widely used in end-user devices.

The vulnerability not only compromises intellectual property, but it can also expose model vulnerabilities, allowing attackers to launch attacks. The authors urge developers to implement safeguards to protect their models from such attacks.

The work, which was supported by the US National Science Foundation, was presented at the Cryptographic Hardware and Embedded Systems Conference. The researchers also notified Google of the vulnerability.

Natasha Kumar

Natasha Kumar has been a reporter on the news desk since 2018. Before that she wrote about young adolescence and family dynamics for Styles and was the legal affairs correspondent for the Metro desk. Before joining The Times Hub, Natasha Kumar worked as a staff writer at the Village Voice and a freelancer for Newsday, The Wall Street Journal, GQ and Mirabella. To get in touch, contact me through my natasha@thetimeshub.in 1-800-268-7116

Share
Published by
Natasha Kumar

Recent Posts

Cable damage in the Gulf of Finland: Eagle S anchor lifted from the seabed

The anchor of the tanker Eagle S, suspected of damaging a cable in the Gulf…

2 hours ago

Glacier energy: how it works in Iceland and what are its capacities

People have been looking for alternative energy sources for a long time. In particular, in…

2 hours ago

It's easier than it seems: AI learned to copy a human personality in just 2 hours

Imagine an AI model that reproduces your behavior and personality traits after a two-hour interview.…

3 hours ago

Thanks to Gemini, you'll soon be able to talk to your TV

Google showed off software and hardware updates to its TVs at CES 2025. Upcoming changes…

3 hours ago

The European Commission will analyze whether Musk's conversation with the leader of the German far-right complies with EU norms

The European Commission will analyze the online conversation between billionaire Elon Musk and the candidate…

3 hours ago

The fourth European head of state publicly condemned Elon Musk's interference in the politics of EU countries

Norwegian Prime Minister Jonas Gahr Støre has expressed concern over the interference of American billionaire…

3 hours ago