File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.conferencePlace US -
dc.citation.title USENIX Network & Distributed System Security Symposium -
dc.contributor.author Park, Minkyung -
dc.contributor.author Kong, Zelun -
dc.contributor.author Tian, Dave Jing -
dc.contributor.author Celik, Z. Berkay -
dc.contributor.author Kim, Chung Hwan -
dc.date.accessioned 2026-03-27T14:02:38Z -
dc.date.available 2026-03-27T14:02:38Z -
dc.date.created 2026-03-27 -
dc.date.issued 2026-02-23 -
dc.description.abstract Deep neural networks (DNNs) are integral to modern computing, powering applications such as image recognition, natural language processing, and audio analysis. The architectures of these models (e.g., the number and types of layers) are considered valuable intellectual property due to the significant expertise and computational effort required for their design. Although trusted execution environments (TEEs) like Intel SGX have been adopted to safeguard these models, recent studies on model extraction attacks have shown that side-channel attacks (SCAs) can still be leveraged to extract the architectures of DNN models. However, many existing model extraction attacks either do not account for TEE protections or are limited to specific model types, reducing their real-world applicability.

In this paper, we introduce DNN Latency Sequencing (DLS), a novel model extraction attack framework that targets DNN architectures running within Intel SGX enclaves. DLS employs SGX-Step to single-step model execution and collect fine-grained latency traces, which are then analyzed at both the function and basic block levels to reconstruct the model architecture. Our key insight is that DNN architectures inherently influence execution behavior, enabling accurate reconstruction from latency patterns. We evaluate DLS on models built with three widely used deep learning libraries, Darknet, TensorFlow Lite, and ONNX Runtime, and show that it achieves architecture recovery accuracies of 97.3%, 96.4%, and 93.6%, respectively. We further demonstrate that DLS enables advanced attacks, highlighting its practicality and effectiveness.
-
dc.identifier.bibliographicCitation USENIX Network & Distributed System Security Symposium -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/91114 -
dc.identifier.url https://www.ndss-symposium.org/ndss-paper/dnn-latency-sequencing-extracting-dnn-architectures-from-intel-sgx-enclaves-with-single-stepping-attacks/ -
dc.language 영어 -
dc.publisher USENIX -
dc.title DNN Latency Sequencing: Extracting DNN Architectures from Intel SGX Enclaves with Single-Stepping Attacks -
dc.type Conference Paper -
dc.date.conferenceDate 2026-02-23 -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.