Close Menu
Ztoog
    What's Hot
    Mobile

    Update Chrome ASAP to patch this zero-day security flaw

    AI

    Conversational AI revolutionizes the customer experience landscape

    Science

    Scandium superconducts at the highest temperature for a pure element

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      How I Turn Unstructured PDFs into Revenue-Ready Spreadsheets

      Is it the best tool for 2025?

      The clocks that helped define time from London’s Royal Observatory

      Summer Movies Are Here, and So Are the New Popcorn Buckets

      India-Pak conflict: Pak appoints ISI chief, appointment comes in backdrop of the Pahalgam attack

    • Technology

      Ensure Hard Work Is Recognized With These 3 Steps

      Cicada map 2025: Where will Brood XIV cicadas emerge this spring?

      Is Duolingo the face of an AI jobs crisis?

      The US DOD transfers its AI-based Open Price Exploration for National Security program to nonprofit Critical Minerals Forum to boost Western supply deals (Ernest Scheyder/Reuters)

      The more Google kills Fitbit, the more I want a Fitbit Sense 3

    • Gadgets

      Maono Caster G1 Neo & PD200X Review: Budget Streaming Gear for Aspiring Creators

      Apple plans to split iPhone 18 launch into two phases in 2026

      Upgrade your desk to Starfleet status with this $95 USB-C hub

      37 Best Graduation Gift Ideas (2025): For College Grads

      Backblaze responds to claims of “sham accounting,” customer backups at risk

    • Mobile

      Samsung Galaxy S25 Edge promo materials leak

      What are people doing with those free T-Mobile lines? Way more than you’d expect

      Samsung doesn’t want budget Galaxy phones to use exclusive AI features

      COROS’s charging adapter is a neat solution to the smartwatch charging cable problem

      Fortnite said to return to the US iOS App Store next week following court verdict

    • Science

      Failed Soviet probe will soon crash to Earth – and we don’t know where

      Trump administration cuts off all future federal funding to Harvard

      Does kissing spread gluten? New research offers a clue.

      Why Balcony Solar Panels Haven’t Taken Off in the US

      ‘Dark photon’ theory of light aims to tear up a century of physics

    • AI

      How to build a better AI benchmark

      Q&A: A roadmap for revolutionizing health care through data-driven innovation | Ztoog

      This data set helps researchers spot harmful stereotypes in LLMs

      Making AI models more trustworthy for high-stakes settings | Ztoog

      The AI Hype Index: AI agent cyberattacks, racing robots, and musical models

    • Crypto

      ‘The Big Short’ Coming For Bitcoin? Why BTC Will Clear $110,000

      Bitcoin Holds Above $95K Despite Weak Blockchain Activity — Analytics Firm Explains Why

      eToro eyes US IPO launch as early as next week amid easing concerns over Trump’s tariffs

      Cardano ‘Looks Dope,’ Analyst Predicts Big Move Soon

      Speak at Ztoog Disrupt 2025: Applications now open

    Ztoog
    Home » Accelerating AI tasks while preserving data security | Ztoog
    AI

    Accelerating AI tasks while preserving data security | Ztoog

    Facebook Twitter Pinterest WhatsApp
    Accelerating AI tasks while preserving data security | Ztoog
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    With the proliferation of computationally intensive machine-learning functions, corresponding to chatbots that carry out real-time language translation, gadget producers usually incorporate specialised {hardware} elements to quickly transfer and course of the large quantities of data these programs demand.

    Choosing the most effective design for these elements, generally known as deep neural community accelerators, is difficult as a result of they will have an infinite vary of design choices. This troublesome downside turns into even thornier when a designer seeks so as to add cryptographic operations to maintain data secure from attackers.

    Now, MIT researchers have developed a search engine that may effectively determine optimum designs for deep neural community accelerators, that protect data security while boosting efficiency.

    Their search software, generally known as SecureLoop, is designed to think about how the addition of data encryption and authentication measures will influence the efficiency and vitality utilization of the accelerator chip. An engineer may use this software to acquire the optimum design of an accelerator tailor-made to their neural community and machine-learning process.

    When in comparison with typical scheduling strategies that don’t think about security, SecureLoop can enhance efficiency of accelerator designs while preserving data protected.  

    Using SecureLoop may assist a person enhance the pace and efficiency of demanding AI functions, corresponding to autonomous driving or medical picture classification, while making certain delicate person data stays secure from some forms of assaults.

    “If you are interested in doing a computation where you are going to preserve the security of the data, the rules that we used before for finding the optimal design are now broken. So all of that optimization needs to be customized for this new, more complicated set of constraints. And that is what [lead author] Kyungmi has done in this paper,” says Joel Emer, an MIT professor of the observe in pc science and electrical engineering and co-author of a paper on SecureLoop.

    Emer is joined on the paper by lead writer Kyungmi Lee, {an electrical} engineering and pc science graduate scholar; Mengjia Yan, the Homer A. Burnell Career Development Assistant Professor of Electrical Engineering and Computer Science and a member of the Computer Science and Artificial Intelligence Laboratory (CSAIL); and senior writer Anantha Chandrakasan, dean of the MIT School of Engineering and the Vannevar Bush Professor of Electrical Engineering and Computer Science. The analysis might be offered on the IEEE/ACM International Symposium on Microarchitecture.

    “The community passively accepted that adding cryptographic operations to an accelerator will introduce overhead. They thought it would introduce only a small variance in the design trade-off space. But, this is a misconception. In fact, cryptographic operations can significantly distort the design space of energy-efficient accelerators. Kyungmi did a fantastic job identifying this issue,” Yan provides.

    Secure acceleration

    A deep neural community consists of many layers of interconnected nodes that course of data. Typically, the output of 1 layer turns into the enter of the following layer. Data are grouped into models referred to as tiles for processing and switch between off-chip reminiscence and the accelerator. Each layer of the neural community can have its personal data tiling configuration.

    A deep neural community accelerator is a processor with an array of computational models that parallelizes operations, like multiplication, in every layer of the community. The accelerator schedule describes how data are moved and processed.

    Since house on an accelerator chip is at a premium, most data are saved in off-chip reminiscence and fetched by the accelerator when wanted. But as a result of data are saved off-chip, they’re weak to an attacker who may steal info or change some values, inflicting the neural community to malfunction.

    “As a chip manufacturer, you can’t guarantee the security of external devices or the overall operating system,” Lee explains.

    Manufacturers can defend data by including authenticated encryption to the accelerator. Encryption scrambles the data utilizing a secret key. Then authentication cuts the data into uniform chunks and assigns a cryptographic hash to every chunk of data, which is saved together with the data chunk in off-chip reminiscence.

    When the accelerator fetches an encrypted chunk of data, generally known as an authentication block, it makes use of a secret key to recuperate and confirm the unique data earlier than processing it.

    But the sizes of authentication blocks and tiles of data don’t match up, so there may very well be a number of tiles in a single block, or a tile may very well be break up between two blocks. The accelerator can’t arbitrarily seize a fraction of an authentication block, so it could find yourself grabbing further data, which makes use of extra vitality and slows down computation.

    Plus, the accelerator nonetheless should run the cryptographic operation on every authentication block, including much more computational value.

    An environment friendly search engine

    With SecureLoop, the MIT researchers sought a technique that might determine the quickest and most vitality environment friendly accelerator schedule — one which minimizes the variety of instances the gadget must entry off-chip reminiscence to seize further blocks of data due to encryption and authentication.  

    They started by augmenting an present search engine Emer and his collaborators beforehand developed, referred to as Timeloop. First, they added a mannequin that might account for the extra computation wanted for encryption and authentication.

    Then, they reformulated the search downside right into a easy mathematical expression, which allows SecureLoop to search out the best authentical block dimension in a way more environment friendly method than looking via all attainable choices.

    “Depending on how you assign this block, the amount of unnecessary traffic might increase or decrease. If you assign the cryptographic block cleverly, then you can just fetch a small amount of additional data,” Lee says.

    Finally, they included a heuristic method that ensures SecureLoop identifies a schedule which maximizes the efficiency of your entire deep neural community, somewhat than solely a single layer.

    At the top, the search engine outputs an accelerator schedule, which incorporates the data tiling technique and the scale of the authentication blocks, that gives the very best pace and vitality effectivity for a particular neural community.

    “The design spaces for these accelerators are huge. What Kyungmi did was figure out some very pragmatic ways to make that search tractable so she could find good solutions without needing to exhaustively search the space,” says Emer.

    When examined in a simulator, SecureLoop recognized schedules that had been as much as 33.2 p.c sooner and exhibited 50.2 p.c higher vitality delay product (a metric associated to vitality effectivity) than different strategies that didn’t think about security.

    The researchers additionally used SecureLoop to discover how the design house for accelerators adjustments when security is taken into account. They discovered that allocating a bit extra of the chip’s space for the cryptographic engine and sacrificing some house for on-chip reminiscence can result in higher efficiency, Lee says.

    In the longer term, the researchers need to use SecureLoop to search out accelerator designs which are resilient to side-channel assaults, which happen when an attacker has entry to bodily {hardware}. For occasion, an attacker may monitor the ability consumption sample of a tool to acquire secret info, even when the data have been encrypted. They are additionally extending SecureLoop so it may very well be utilized to different kinds of computation.

    This work is funded, partially, by Samsung Electronics and the Korea Foundation for Advanced Studies.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    AI

    How to build a better AI benchmark

    AI

    Q&A: A roadmap for revolutionizing health care through data-driven innovation | Ztoog

    AI

    This data set helps researchers spot harmful stereotypes in LLMs

    AI

    Making AI models more trustworthy for high-stakes settings | Ztoog

    AI

    The AI Hype Index: AI agent cyberattacks, racing robots, and musical models

    AI

    Novel method detects microbial contamination in cell cultures | Ztoog

    AI

    Seeing AI as a collaborator, not a creator

    AI

    “Periodic table of machine learning” could fuel AI discovery | Ztoog

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    Mobile

    Microsoft is working on a YouTube-like video copyright identifying app 

    Microsoft seems to be working on a new YouTube-like software for movies. In a lately…

    Technology

    For the first time NASA has asked industry about private missions to Mars

    Enlarge / NASA is all in favour of whether or not private corporations have the…

    AI

    Creating bespoke programming languages for efficient visual AI systems | Ztoog

    A single {photograph} affords glimpses into the creator’s world — their pursuits and emotions a…

    The Future

    Tron founder Justin Sun reels after two crypto hacks

    Two cryptocurrency platforms with ties to digital entrepreneur Justin Sun have been the targets of…

    Mobile

    WhatsApp now lets you send video messages

    Voice messages have been a staple characteristic of WhatsApp for years now. And so have…

    Our Picks
    The Future

    PS5 ‘slim’ teardown shows the clever engineering of its detachable disc drive

    Crypto

    Justin Sun Will Now Publicly Trade Meme Coins Like PEPE, Best Time To Copy Trade Him?

    The Future

    GPT-4 gives medical advice that saves doctors’ time but can also be harmful

    Categories
    • AI (1,482)
    • Crypto (1,744)
    • Gadgets (1,796)
    • Mobile (1,839)
    • Science (1,853)
    • Technology (1,789)
    • The Future (1,635)
    Most Popular
    Gadgets

    HP printers should have EPEAT ecolabels revoked, trade group demands

    Crypto

    Bitcoin is on the move, Spotify cuts staff and more money floods AI

    Science

    Mosquitoes Could Help Prevent Helicopter and Drone Accidents

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2025 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.