Bayerl et al., 2020 - Google Patents
Offline model guard: Secure and private ML on mobile devicesBayerl et al., 2020
View PDF- Document ID
- 5083387891213376241
- Author
- Bayerl S
- Frassetto T
- Jauernig P
- Riedhammer K
- Sadeghi A
- Schneider T
- Stapf E
- Weinert C
- Publication year
- Publication venue
- arXiv preprint arXiv:2007.02351
External Links
Snippet
Performing machine learning tasks in mobile applications yields a challenging conflict of interest: highly sensitive client information (eg, speech data) should remain private while also the intellectual property of service providers (eg, model parameters) must be protected …
- 238000000034 method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/485—Task life-cycle, e.g. stopping, restarting, resuming execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bayerl et al. | Offline model guard: Secure and private ML on mobile devices | |
Brasser et al. | VoiceGuard: Secure and Private Speech Processing. | |
EP3562087B1 (en) | High-throughput privacy-friendly hardware assisted machine learning on edge nodes | |
US9576147B1 (en) | Security policy application through data tagging | |
CN109587106B (en) | Cross-domain security in a password-partitioned cloud | |
US10050982B1 (en) | Systems and methods for reverse-engineering malware protocols | |
US20210374234A1 (en) | Using trusted execution environments to perform a communal operation for mutually-untrusted devices | |
US11574032B2 (en) | Systems and methods for signing an AI model with a watermark for a data processing accelerator | |
US20220067570A1 (en) | Training machine learning models with training data | |
KR20050085678A (en) | Attestation using both fixed token and portable token | |
CN113260993A (en) | Secure deployment and operation of virtual platform systems | |
US11582260B2 (en) | Systems and methods for verifying a watermark of an AI model for a data processing accelerator | |
US11579928B2 (en) | Systems and methods for configuring a watermark unit with watermark algorithms for a data processing accelerator | |
US12314395B2 (en) | Training data protection for artificial intelligence model in partitioned execution environment | |
CN117786694B (en) | System and method for constructing artificial intelligent model operation safe and reliable execution environment | |
US11775692B2 (en) | Method and system for encrypting data using a kernel | |
Zobaed et al. | Confidential Computing Across Edge‐To‐Cloud for Machine Learning: A Survey Study | |
Sharma | ENHANCE DATA SECURITY IN CLOUD COMPUTING USING MACHINE LEARNING AND HYBRID CRYPTOGRAPHY TECHNIQUES. | |
Duy et al. | Confidential machine learning computation in untrusted environments: A systems security perspective | |
Gnanavel et al. | Implementation of Block‐Level Double Encryption Based on Machine Learning Techniques for Attack Detection and Prevention | |
Babar et al. | Trusted deep neural execution—a survey | |
Bayerl et al. | Privacy-preserving speech processing via STPC and TEEs | |
JP2022102062A (en) | Methods, devices and systems for data privacy management | |
US20210110010A1 (en) | Method and system for signing an artificial intelligence watermark using a query | |
Shepherd | Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments |