[go: up one dir, main page]

Bayerl et al., 2020 - Google Patents

Offline model guard: Secure and private ML on mobile devices

Bayerl et al., 2020

View PDF
Document ID
5083387891213376241
Author
Bayerl S
Frassetto T
Jauernig P
Riedhammer K
Sadeghi A
Schneider T
Stapf E
Weinert C
Publication year
Publication venue
arXiv preprint arXiv:2007.02351

External Links

Snippet

Performing machine learning tasks in mobile applications yields a challenging conflict of interest: highly sensitive client information (eg, speech data) should remain private while also the intellectual property of service providers (eg, model parameters) must be protected …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/485Task life-cycle, e.g. stopping, restarting, resuming execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/455Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • G06F15/163Interprocessor communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Bayerl et al. Offline model guard: Secure and private ML on mobile devices
Brasser et al. VoiceGuard: Secure and Private Speech Processing.
EP3562087B1 (en) High-throughput privacy-friendly hardware assisted machine learning on edge nodes
US9576147B1 (en) Security policy application through data tagging
CN109587106B (en) Cross-domain security in a password-partitioned cloud
US10050982B1 (en) Systems and methods for reverse-engineering malware protocols
US20210374234A1 (en) Using trusted execution environments to perform a communal operation for mutually-untrusted devices
US11574032B2 (en) Systems and methods for signing an AI model with a watermark for a data processing accelerator
US20220067570A1 (en) Training machine learning models with training data
KR20050085678A (en) Attestation using both fixed token and portable token
CN113260993A (en) Secure deployment and operation of virtual platform systems
US11582260B2 (en) Systems and methods for verifying a watermark of an AI model for a data processing accelerator
US11579928B2 (en) Systems and methods for configuring a watermark unit with watermark algorithms for a data processing accelerator
US12314395B2 (en) Training data protection for artificial intelligence model in partitioned execution environment
CN117786694B (en) System and method for constructing artificial intelligent model operation safe and reliable execution environment
US11775692B2 (en) Method and system for encrypting data using a kernel
Zobaed et al. Confidential Computing Across Edge‐To‐Cloud for Machine Learning: A Survey Study
Sharma ENHANCE DATA SECURITY IN CLOUD COMPUTING USING MACHINE LEARNING AND HYBRID CRYPTOGRAPHY TECHNIQUES.
Duy et al. Confidential machine learning computation in untrusted environments: A systems security perspective
Gnanavel et al. Implementation of Block‐Level Double Encryption Based on Machine Learning Techniques for Attack Detection and Prevention
Babar et al. Trusted deep neural execution—a survey
Bayerl et al. Privacy-preserving speech processing via STPC and TEEs
JP2022102062A (en) Methods, devices and systems for data privacy management
US20210110010A1 (en) Method and system for signing an artificial intelligence watermark using a query
Shepherd Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments