Close Menu
Ztoog
    What's Hot
    Science

    NASA’s newest X-plane is the long-winged X-66A

    Crypto

    Crypto Spot Trading Volumes Climb To 8-Month Highs

    Crypto

    Mila Kunis and Ashton Kutcher’s ‘Stoner Cats’ NFTs get smoked by the SEC

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      How I Turn Unstructured PDFs into Revenue-Ready Spreadsheets

      Is it the best tool for 2025?

      The clocks that helped define time from London’s Royal Observatory

      Summer Movies Are Here, and So Are the New Popcorn Buckets

      India-Pak conflict: Pak appoints ISI chief, appointment comes in backdrop of the Pahalgam attack

    • Technology

      Ensure Hard Work Is Recognized With These 3 Steps

      Cicada map 2025: Where will Brood XIV cicadas emerge this spring?

      Is Duolingo the face of an AI jobs crisis?

      The US DOD transfers its AI-based Open Price Exploration for National Security program to nonprofit Critical Minerals Forum to boost Western supply deals (Ernest Scheyder/Reuters)

      The more Google kills Fitbit, the more I want a Fitbit Sense 3

    • Gadgets

      Maono Caster G1 Neo & PD200X Review: Budget Streaming Gear for Aspiring Creators

      Apple plans to split iPhone 18 launch into two phases in 2026

      Upgrade your desk to Starfleet status with this $95 USB-C hub

      37 Best Graduation Gift Ideas (2025): For College Grads

      Backblaze responds to claims of “sham accounting,” customer backups at risk

    • Mobile

      Samsung Galaxy S25 Edge promo materials leak

      What are people doing with those free T-Mobile lines? Way more than you’d expect

      Samsung doesn’t want budget Galaxy phones to use exclusive AI features

      COROS’s charging adapter is a neat solution to the smartwatch charging cable problem

      Fortnite said to return to the US iOS App Store next week following court verdict

    • Science

      Failed Soviet probe will soon crash to Earth – and we don’t know where

      Trump administration cuts off all future federal funding to Harvard

      Does kissing spread gluten? New research offers a clue.

      Why Balcony Solar Panels Haven’t Taken Off in the US

      ‘Dark photon’ theory of light aims to tear up a century of physics

    • AI

      How to build a better AI benchmark

      Q&A: A roadmap for revolutionizing health care through data-driven innovation | Ztoog

      This data set helps researchers spot harmful stereotypes in LLMs

      Making AI models more trustworthy for high-stakes settings | Ztoog

      The AI Hype Index: AI agent cyberattacks, racing robots, and musical models

    • Crypto

      ‘The Big Short’ Coming For Bitcoin? Why BTC Will Clear $110,000

      Bitcoin Holds Above $95K Despite Weak Blockchain Activity — Analytics Firm Explains Why

      eToro eyes US IPO launch as early as next week amid easing concerns over Trump’s tariffs

      Cardano ‘Looks Dope,’ Analyst Predicts Big Move Soon

      Speak at Ztoog Disrupt 2025: Applications now open

    Ztoog
    Home » This tiny chip can safeguard user data while enabling efficient computing on a smartphone | Ztoog
    AI

    This tiny chip can safeguard user data while enabling efficient computing on a smartphone | Ztoog

    Facebook Twitter Pinterest WhatsApp
    This tiny chip can safeguard user data while enabling efficient computing on a smartphone | Ztoog
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    Health-monitoring apps can assist individuals handle continual ailments or keep on monitor with health targets, utilizing nothing greater than a smartphone. However, these apps can be gradual and energy-inefficient as a result of the huge machine-learning fashions that energy them should be shuttled between a smartphone and a central reminiscence server.

    Engineers usually pace issues up utilizing {hardware} that reduces the necessity to transfer a lot data forwards and backwards. While these machine-learning accelerators can streamline computation, they’re prone to attackers who can steal secret data.

    To scale back this vulnerability, researchers from MIT and the MIT-IBM Watson AI Lab created a machine-learning accelerator that’s immune to the 2 most typical forms of assaults. Their chip can preserve a user’s well being information, monetary data, or different delicate data personal while nonetheless enabling enormous AI fashions to run effectively on gadgets.

    The staff developed a number of optimizations that allow sturdy safety while solely barely slowing the machine. Moreover, the added safety doesn’t affect the accuracy of computations. This machine-learning accelerator may very well be notably useful for demanding AI functions like augmented and digital actuality or autonomous driving.

    While implementing the chip would make a machine barely dearer and fewer energy-efficient, that’s generally a worthwhile value to pay for safety, says lead creator Maitreyi Ashok, {an electrical} engineering and pc science (EECS) graduate pupil at MIT.

    “It is important to design with security in mind from the ground up. If you are trying to add even a minimal amount of security after a system has been designed, it is prohibitively expensive. We were able to effectively balance a lot of these tradeoffs during the design phase,” says Ashok.

    Her co-authors embody Saurav Maji, an EECS graduate pupil; Xin Zhang and John Cohn of the MIT-IBM Watson AI Lab; and senior creator Anantha Chandrakasan, MIT’s chief innovation and technique officer, dean of the School of Engineering, and the Vannevar Bush Professor of EECS. The analysis will likely be offered on the IEEE Custom Integrated Circuits Conference.

    Side-channel susceptibility

    The researchers focused a sort of machine-learning accelerator referred to as digital in-memory compute. A digital IMC chip performs computations inside a machine’s reminiscence, the place items of a machine-learning mannequin are saved after being moved over from a central server.

    The complete mannequin is just too massive to retailer on the machine, however by breaking it into items and reusing these items as a lot as doable, IMC chips scale back the quantity of data that should be moved forwards and backwards.

    But IMC chips can be prone to hackers. In a side-channel assault, a hacker screens the chip’s energy consumption and makes use of statistical methods to reverse-engineer data because the chip computes. In a bus-probing assault, the hacker can steal bits of the mannequin and dataset by probing the communication between the accelerator and the off-chip reminiscence.

    Digital IMC speeds computation by performing tens of millions of operations without delay, however this complexity makes it powerful to stop assaults utilizing conventional safety measures, Ashok says.

    She and her collaborators took a three-pronged method to blocking side-channel and bus-probing assaults.

    First, they employed a safety measure the place data within the IMC are break up into random items. For occasion, a bit zero may be break up into three bits that also equal zero after a logical operation. The IMC by no means computes with all items in the identical operation, so a side-channel assault might by no means reconstruct the true data.

    But for this system to work, random bits should be added to separate the data. Because digital IMC performs tens of millions of operations without delay, producing so many random bits would contain an excessive amount of computing. For their chip, the researchers discovered a approach to simplify computations, making it simpler to successfully break up data while eliminating the necessity for random bits.

    Second, they prevented bus-probing assaults utilizing a light-weight cipher that encrypts the mannequin saved in off-chip reminiscence. This light-weight cipher solely requires easy computations. In addition, they solely decrypted the items of the mannequin saved on the chip when obligatory.

    Third, to enhance safety, they generated the important thing that decrypts the cipher straight on the chip, relatively than shifting it forwards and backwards with the mannequin. They generated this distinctive key from random variations within the chip which can be launched throughout manufacturing, utilizing what is called a bodily unclonable perform.

    “Maybe one wire is going to be a little bit thicker than another. We can use these variations to get zeros and ones out of a circuit. For every chip, we can get a random key that should be consistent because these random properties shouldn’t change significantly over time,” Ashok explains.

    They reused the reminiscence cells on the chip, leveraging the imperfections in these cells to generate the important thing. This requires much less computation than producing a key from scratch.

    “As security has become a critical issue in the design of edge devices, there is a need to develop a complete system stack focusing on secure operation. This work focuses on security for machine-learning workloads and describes a digital processor that uses cross-cutting optimization. It incorporates encrypted data access between memory and processor, approaches to preventing side-channel attacks using randomization, and exploiting variability to generate unique codes. Such designs are going to be critical in future mobile devices,” says Chandrakasan.

    Safety testing

    To check their chip, the researchers took on the function of hackers and tried to steal secret data utilizing side-channel and bus-probing assaults.

    Even after making tens of millions of makes an attempt, they couldn’t reconstruct any actual data or extract items of the mannequin or dataset. The cipher additionally remained unbreakable. By distinction, it took solely about 5,000 samples to steal data from an unprotected chip.

    The addition of safety did scale back the vitality effectivity of the accelerator, and it additionally required a bigger chip space, which might make it dearer to manufacture.

    The staff is planning to discover strategies that might scale back the vitality consumption and dimension of their chip sooner or later, which might make it simpler to implement at scale.

    “As it becomes too expensive, it becomes harder to convince someone that security is critical. Future work could explore these tradeoffs. Maybe we could make it a little less secure but easier to implement and less expensive,” Ashok says.

    The analysis is funded, partially, by the MIT-IBM Watson AI Lab, the National Science Foundation, and a Mathworks Engineering Fellowship.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    AI

    How to build a better AI benchmark

    AI

    Q&A: A roadmap for revolutionizing health care through data-driven innovation | Ztoog

    AI

    This data set helps researchers spot harmful stereotypes in LLMs

    AI

    Making AI models more trustworthy for high-stakes settings | Ztoog

    AI

    The AI Hype Index: AI agent cyberattacks, racing robots, and musical models

    AI

    Novel method detects microbial contamination in cell cultures | Ztoog

    AI

    Seeing AI as a collaborator, not a creator

    AI

    “Periodic table of machine learning” could fuel AI discovery | Ztoog

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    Crypto

    Analyst Highlights 3 Key Factors Pointing To A Price Boom

    Michael van de Poppe, a distinguished crypto analyst, not too long ago outlined three key…

    The Future

    Bletchley Park AI summit 2023: G7 countries agree AI code of conduct

    G7 nations are eager to work collectively on regulating synthetic intelligenceYuki Kurose/ AP / Alamy…

    Technology

    This unusual Samsung deal gets you two 4K smart TVs for the price of one

    As it rolls out its beautiful new 2024 smart TV line, Samsung will need to…

    Crypto

    Solana Drops Below 100-Day MA On 4-Hour Chart, SOL Price In Danger?

    Having failed to interrupt its earlier excessive for the yr, the value of Solana has…

    Mobile

    Samsung is now selling Certified Re-Newed Galaxy S23 series in the US

    Just in time for Earth Day, Samsung introduced it is now selling Certified Re-Newed (CRN)…

    Our Picks
    Gadgets

    Infineon And Wolfspeed Expand Silicon Carbide Wafer Supply Agreement

    Gadgets

    These portable padded stadium seats are on sale and butt-approved

    Technology

    End of an era: Microsoft bids farewell to WordPad after nearly 30 years

    Categories
    • AI (1,482)
    • Crypto (1,744)
    • Gadgets (1,796)
    • Mobile (1,839)
    • Science (1,853)
    • Technology (1,789)
    • The Future (1,635)
    Most Popular
    The Future

    US legislators vote to ban TikTok unless it severs ties with China

    Gadgets

    Mercedes-Benz eActros 600: Electric Truck Shows Great Autonomy In Warm And Cold Weather

    Science

    Quantum computer performs error-resistant operations with logical qubits

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2025 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.