Skip to content

Commit

Permalink
Added learning objectives
Browse files Browse the repository at this point in the history
  • Loading branch information
profvjreddi committed Nov 22, 2023
1 parent 6ed6302 commit 8cb0ad1
Showing 1 changed file with 22 additions and 1 deletion.
23 changes: 22 additions & 1 deletion privacy_security.qmd
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,23 @@ unlocking the benefits of AI.
::: {.callout-tip}
## Learning Objectives

* coming soon.
* Understand key ML privacy and security risks like data leaks, model theft, adversarial attacks, bias, and unintended data access.

* Learn from historical hardware and embedded systems security incidents.

* Identify threats to ML models like data poisoning, model extraction, membership inference, and adversarial examples.

* Recognize hardware security threats to embedded ML spanning hardware bugs, physical attacks, side channels, counterfeit components, etc.

* Explore embedded ML defenses like trusted execution environments, secure boot, physical unclonable functions, and hardware security modules.

* Discuss privacy issues in handling sensitive user data with embedded ML, including regulations.

* Learn privacy-preserving ML techniques like differential privacy, federated learning, homomorphic encryption, and synthetic data generation.

* Understand tradeoffs between privacy, accuracy, efficiency, threat models, and trust assumptions.

* Recognize the need for a cross-layer perspective spanning electrical, firmware, software, and physical design when securing embedded ML devices.

:::

Expand Down Expand Up @@ -2925,3 +2941,8 @@ techniques and their pros and cons:


## Conclusion

Machine learning hardware security is a critical concern as embedded ML systems are increasingly deployed in safety-critical domains like medical devices, industrial controls, and autonomous vehicles. We have explored various threats spanning hardware bugs, physical attacks, side channels, supply chain risks and more. Defenses like trusted execution environments, secure boot, PUFs, and hardware security modules provide multilayer protection tailored for resource-constrained embedded devices.

However, continual vigilance is essential to track emerging attack vectors and address potential vulnerabilities through secure engineering practices across the hardware lifecycle. As ML and embedded ML spreads, maintaining rigorous security foundations that match the field's accelerating pace of innovation remains imperative.

0 comments on commit 8cb0ad1

Please sign in to comment.