no code implementations • 24 Aug 2023 • M. Caner Tol, Berk Sunar
In this work, we explore the use of LLMs in generating patches for vulnerable code with microarchitectural side-channel leakages.
1 code implementation • 14 Oct 2021 • M. Caner Tol, Saad Islam, Andrew J. Adiletta, Berk Sunar, Ziming Zhang
To this end, we first investigate the viability of backdoor injection attacks in real-life deployments of DNNs on hardware and address such practical issues in hardware implementation from a novel optimization perspective.
no code implementations • 29 Sep 2021 • M. Caner Tol, Saad Islam, Berk Sunar, Ziming Zhang
Recent works focus on software simulation of backdoor injection during the inference phase by modifying network weights, which we find often unrealistic in practice due to the hardware restriction such as bit allocation in memory.
1 code implementation • 25 Jun 2020 • M. Caner Tol, Berk Gulmezoglu, Koray Yurtseven, Berk Sunar
In this work, we employ both fuzzing and deep learning techniques to automate the generation and detection of Spectre gadgets.
no code implementations • 1 Mar 2020 • Laia Amorós, Syed Mahbub Hafiz, Keewoo Lee, M. Caner Tol
We propose a HE-based protocol for trading ML models and describe possible improvements to the protocol to make the overall transaction more efficient and secure.
no code implementations • 27 Nov 2018 • Berk Gulmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth, Berk Sunar
Over the past years, literature has shown that attacks exploiting the microarchitecture of modern processors pose a serious threat to the privacy of mobile phone users.