Skip to main content
STORY | Webinar | Attacks on Tiny AI

Attacks on Tiny AI

Tiny Intelligence is prone to attacks. In most cases, traditional embedded security cannot detect attacks on their AI. With minimum or no effort, the ports can be hacked to gain access to the Tiny Device, there by making the attacks easier. Watch the talk by Yuvaraj Govindarajulu.

Attacks on Tiny AI

A Talk on "Attacks on Tiny AI" at DEFCON 30 by AI Village

Abstract

As of this year, there are over a 2.5 billion Edge-enabled IoT devices and close to 1.5 million new AI Edge devices projected to be shipped. These devices include smaller compressed versions of AI models running on them. While in the last years, we have been able to improve the performance of the AI models and reduce their memory footprint on these devices, not much has been spoken about the security threats of the AI models on tiny models.

First step towards protecting these AI models from attacks such as Model Theft, evasion and data poisoning, would be to study the efficacy of attacks on these Tiny Intelligent systems. Some of them at the lower Hardware and software layers could be protected through classical embedded security, they alone would not suffice to protect these Tiny Intelligence. Many of these tiny devices (microcontrollers) do not come with built-in security features because of their price and power requirements. So an understanding of how the core AI algorithm could be attacked and protected become necessary. In this talk we go about discussing what could be the possible threats to these devices and provide directions on how additional AI security measures would save the Tiny intelligence.


Bosch AIShield | The Need to Secure AI | MLOps Summit by AI infrastructure Alliance

Bosch AIShield | Attacks on Tiny AI | DEFCON 30 by AI Village