Close Menu
Ztoog
    What's Hot
    Science

    MPAs protect fish health and community wealth

    Gadgets

    Person who made the Windows 3.1 port of Wordle is back with a ChatGPT client

    Gadgets

    Scientists Find Potential Evidence Of Alien Megastructures

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      What is Project Management? 5 Best Tools that You Can Try

      Operational excellence strategy and continuous improvement

      Hannah Fry: AI isn’t as powerful as we think

      FanDuel goes all in on responsible gaming push with new Play with a Plan campaign

      Gettyimages.com Is the Best Website on the Internet Right Now

    • Technology

      Iran war: How could it end?

      Democratic senators question CFTC staffing cuts in Chicago enforcement office

      Google’s Cloud AI lead on the three frontiers of model capability

      AMD agrees to backstop a $300M loan from Goldman Sachs for Crusoe to buy AMD AI chips, the first known case of AMD chips used as debt collateral (The Information)

      Productivity apps failed me when I needed them most

    • Gadgets

      macOS Tahoe 26.3.1 update will “upgrade” your M5’s CPU to new “super” cores

      Lenovo Shows Off a ThinkBook Modular AI PC Concept With Swappable Ports and Detachable Displays at MWC 2026

      POCO M8 Review: The Ultimate Budget Smartphone With Some Cons

      The Mission: Impossible of SSDs has arrived with a fingerprint lock

      6 Best Phones With Headphone Jacks (2026), Tested and Reviewed

    • Mobile

      Android’s March update is all about finding people, apps, and your missing bags

      Watch Xiaomi’s global launch event live here

      Our poll shows what buyers actually care about in new smartphones (Hint: it’s not AI)

      Is Strava down for you? You’re not alone

      The Motorola Razr FIFA World Cup 2026 Edition was literally just unveiled, and Verizon is already giving them away

    • Science

      Big Tech Signs White House Data Center Pledge With Good Optics and Little Substance

      Inside the best dark matter detector ever built

      NASA’s Artemis moon exploration programme is getting a major makeover

      Scientists crack the case of “screeching” Scotch tape

      Blue-faced, puffy-lipped monkey scores a rare conservation win

    • AI

      Online harassment is entering its AI era

      Meet NullClaw: The 678 KB Zig AI Agent Framework Running on 1 MB RAM and Booting in Two Milliseconds

      New method could increase LLM training efficiency | Ztoog

      The human work behind humanoid robots is being hidden

      NVIDIA Releases DreamDojo: An Open-Source Robot World Model Trained on 44,711 Hours of Real-World Human Video Data

    • Crypto

      Google paid startup Form Energy $1B for its massive 100-hour battery

      Ethereum Breakout Alert: Corrective Channel Flip Sparks Impulsive Wave

      Show Your ID Or No Deal

      Jane Street sued for alleged front-running trades that accelerated Terraform Labs meltdown

      Bitcoin Trades Below ETF Cost-Basis As MVRV Signals Mounting Pressure

    Ztoog
    Home » This tiny chip can safeguard user data while enabling efficient computing on a smartphone | Ztoog
    AI

    This tiny chip can safeguard user data while enabling efficient computing on a smartphone | Ztoog

    Facebook Twitter Pinterest WhatsApp
    This tiny chip can safeguard user data while enabling efficient computing on a smartphone | Ztoog
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    Health-monitoring apps can assist individuals handle continual ailments or keep on monitor with health targets, utilizing nothing greater than a smartphone. However, these apps can be gradual and energy-inefficient as a result of the huge machine-learning fashions that energy them should be shuttled between a smartphone and a central reminiscence server.

    Engineers usually pace issues up utilizing {hardware} that reduces the necessity to transfer a lot data forwards and backwards. While these machine-learning accelerators can streamline computation, they’re prone to attackers who can steal secret data.

    To scale back this vulnerability, researchers from MIT and the MIT-IBM Watson AI Lab created a machine-learning accelerator that’s immune to the 2 most typical forms of assaults. Their chip can preserve a user’s well being information, monetary data, or different delicate data personal while nonetheless enabling enormous AI fashions to run effectively on gadgets.

    The staff developed a number of optimizations that allow sturdy safety while solely barely slowing the machine. Moreover, the added safety doesn’t affect the accuracy of computations. This machine-learning accelerator may very well be notably useful for demanding AI functions like augmented and digital actuality or autonomous driving.

    While implementing the chip would make a machine barely dearer and fewer energy-efficient, that’s generally a worthwhile value to pay for safety, says lead creator Maitreyi Ashok, {an electrical} engineering and pc science (EECS) graduate pupil at MIT.

    “It is important to design with security in mind from the ground up. If you are trying to add even a minimal amount of security after a system has been designed, it is prohibitively expensive. We were able to effectively balance a lot of these tradeoffs during the design phase,” says Ashok.

    Her co-authors embody Saurav Maji, an EECS graduate pupil; Xin Zhang and John Cohn of the MIT-IBM Watson AI Lab; and senior creator Anantha Chandrakasan, MIT’s chief innovation and technique officer, dean of the School of Engineering, and the Vannevar Bush Professor of EECS. The analysis will likely be offered on the IEEE Custom Integrated Circuits Conference.

    Side-channel susceptibility

    The researchers focused a sort of machine-learning accelerator referred to as digital in-memory compute. A digital IMC chip performs computations inside a machine’s reminiscence, the place items of a machine-learning mannequin are saved after being moved over from a central server.

    The complete mannequin is just too massive to retailer on the machine, however by breaking it into items and reusing these items as a lot as doable, IMC chips scale back the quantity of data that should be moved forwards and backwards.

    But IMC chips can be prone to hackers. In a side-channel assault, a hacker screens the chip’s energy consumption and makes use of statistical methods to reverse-engineer data because the chip computes. In a bus-probing assault, the hacker can steal bits of the mannequin and dataset by probing the communication between the accelerator and the off-chip reminiscence.

    Digital IMC speeds computation by performing tens of millions of operations without delay, however this complexity makes it powerful to stop assaults utilizing conventional safety measures, Ashok says.

    She and her collaborators took a three-pronged method to blocking side-channel and bus-probing assaults.

    First, they employed a safety measure the place data within the IMC are break up into random items. For occasion, a bit zero may be break up into three bits that also equal zero after a logical operation. The IMC by no means computes with all items in the identical operation, so a side-channel assault might by no means reconstruct the true data.

    But for this system to work, random bits should be added to separate the data. Because digital IMC performs tens of millions of operations without delay, producing so many random bits would contain an excessive amount of computing. For their chip, the researchers discovered a approach to simplify computations, making it simpler to successfully break up data while eliminating the necessity for random bits.

    Second, they prevented bus-probing assaults utilizing a light-weight cipher that encrypts the mannequin saved in off-chip reminiscence. This light-weight cipher solely requires easy computations. In addition, they solely decrypted the items of the mannequin saved on the chip when obligatory.

    Third, to enhance safety, they generated the important thing that decrypts the cipher straight on the chip, relatively than shifting it forwards and backwards with the mannequin. They generated this distinctive key from random variations within the chip which can be launched throughout manufacturing, utilizing what is called a bodily unclonable perform.

    “Maybe one wire is going to be a little bit thicker than another. We can use these variations to get zeros and ones out of a circuit. For every chip, we can get a random key that should be consistent because these random properties shouldn’t change significantly over time,” Ashok explains.

    They reused the reminiscence cells on the chip, leveraging the imperfections in these cells to generate the important thing. This requires much less computation than producing a key from scratch.

    “As security has become a critical issue in the design of edge devices, there is a need to develop a complete system stack focusing on secure operation. This work focuses on security for machine-learning workloads and describes a digital processor that uses cross-cutting optimization. It incorporates encrypted data access between memory and processor, approaches to preventing side-channel attacks using randomization, and exploiting variability to generate unique codes. Such designs are going to be critical in future mobile devices,” says Chandrakasan.

    Safety testing

    To check their chip, the researchers took on the function of hackers and tried to steal secret data utilizing side-channel and bus-probing assaults.

    Even after making tens of millions of makes an attempt, they couldn’t reconstruct any actual data or extract items of the mannequin or dataset. The cipher additionally remained unbreakable. By distinction, it took solely about 5,000 samples to steal data from an unprotected chip.

    The addition of safety did scale back the vitality effectivity of the accelerator, and it additionally required a bigger chip space, which might make it dearer to manufacture.

    The staff is planning to discover strategies that might scale back the vitality consumption and dimension of their chip sooner or later, which might make it simpler to implement at scale.

    “As it becomes too expensive, it becomes harder to convince someone that security is critical. Future work could explore these tradeoffs. Maybe we could make it a little less secure but easier to implement and less expensive,” Ashok says.

    The analysis is funded, partially, by the MIT-IBM Watson AI Lab, the National Science Foundation, and a Mathworks Engineering Fellowship.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    AI

    Online harassment is entering its AI era

    AI

    Meet NullClaw: The 678 KB Zig AI Agent Framework Running on 1 MB RAM and Booting in Two Milliseconds

    AI

    New method could increase LLM training efficiency | Ztoog

    AI

    The human work behind humanoid robots is being hidden

    AI

    NVIDIA Releases DreamDojo: An Open-Source Robot World Model Trained on 44,711 Hours of Real-World Human Video Data

    AI

    Personalization features can make LLMs more agreeable | Ztoog

    AI

    AI is already making online crimes easier. It could get much worse.

    AI

    NVIDIA Researchers Introduce KVTC Transform Coding Pipeline to Compress Key-Value Caches by 20x for Efficient LLM Serving

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    The Future

    25+ Ongoing Memorial Day TV Deals on Samsung, Sony, TCL and More

    Samsung/CNETIf you missed out on scoring a brand new TV on Memorial Day, don’t fret.…

    Crypto

    Peter Schiff Questions True Agenda Behind MicroStrategy’s Bitcoin Acquisition

    Michael Saylor’s MicroStrategy is presently within the limelight, as Gold advocate and Bitcoin critic Peter…

    Crypto

    Market Expert Debunks Possible Bitcoin Top In November Using 9-12 Months Retail Cycle

    The debate round Bitcoin’s prime for this cycle has been a serious matter as market…

    The Future

    Hey Google, I get raising prices but WTF?!

    I’m gob smacked…Genuinely shocked proper now on the whopping — between 20 and 83% —…

    AI

    Deci AI Introduces DeciLM-7B: A Super Fast and Super Accurate 7 Billion-Parameter Large Language Model (LLM)

    In the ever-evolving area of technological developments, language fashions have develop into indispensable. These techniques,…

    Our Picks
    Gadgets

    The Pixel Watch 2 is official with a Snapdragon W5+ chip

    AI

    A creation story told through immersive technology | Ztoog

    The Future

    Twitter rebrands its Android app with the new X logo

    Categories
    • AI (1,560)
    • Crypto (1,826)
    • Gadgets (1,870)
    • Mobile (1,910)
    • Science (1,939)
    • Technology (1,862)
    • The Future (1,716)
    Most Popular
    Mobile

    Android Device Streaming comes to Samsung, Xiaomi, and Oppo Device Labs

    Science

    Photos of the Perseid meteor shower from around the world

    Crypto

    How A Morning Star Pattern Could Awaken Altcoins

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2026 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.