• Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Intelligence
    • Policy Intelligence
    • Security Intelligence
    • Economic Intelligence
    • Fashion Intelligence
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • LBNN Blueprints
  • Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Intelligence
    • Policy Intelligence
    • Security Intelligence
    • Economic Intelligence
    • Fashion Intelligence
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • LBNN Blueprints

New technique enables theft without hacking into a device

Simon Osuji by Simon Osuji
December 13, 2024
in Artificial Intelligence
0
New technique enables theft without hacking into a device
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter


Researchers demonstrate new technique for stealing AI models
Proposed comprehensive hyperparameter extraction framework. Credit: IACR Transactions on Cryptographic Hardware and Embedded Systems (2024). DOI: 10.46586/tches.v2025.i1.78-103

Researchers have demonstrated the ability to steal an artificial intelligence (AI) model without hacking into the device where the model was running. The technique is novel in that it works even when the thief has no prior knowledge of the software or architecture that support the AI.

Related posts

Moving experimental pilots to AI production

Moving experimental pilots to AI production

February 5, 2026
Motorola Moto Watch Review: Polar-Powered

Motorola Moto Watch Review: Polar-Powered

February 5, 2026

“AI models are valuable, we don’t want people to steal them,” says Aydin Aysu, co-author of a paper on the work and an associate professor of electrical and computer engineering at North Carolina State University.

“Building a model is expensive and requires significant computing resources. But just as importantly, when a model is leaked, or stolen, the model also becomes more vulnerable to attacks—because third parties can study the model and identify any weaknesses.”

“As we note in the paper, model stealing attacks on AI and machine learning devices undermine intellectual property rights, compromise the competitive advantage of the model’s developers, and can expose sensitive data embedded in the model’s behavior,” says Ashley Kurian, first author of the paper and a Ph.D. student at NC State.

The paper, “TPUXtract: An Exhaustive Hyperparameter Extraction Framework,” is published online in the IACR Transactions on Cryptographic Hardware and Embedded Systems. In this work, the researchers stole the hyperparameters of an AI model that was running on a Google Edge Tensor Processing Unit (TPU).

“In practical terms, that means we were able to determine the architecture and specific characteristics—known as layer details—we would need to make a copy of the AI model,” says Kurian.

“Because we stole the architecture and layer details, we were able to recreate the high-level features of the AI,” Aysu says. “We then used that information to recreate the functional AI model, or a very close surrogate of that model.”

The researchers used the Google Edge TPU for this demonstration because it is a commercially available chip that is widely used to run AI models on edge devices—meaning devices utilized by end users in the field, as opposed to AI systems that are used for database applications.

“This technique could be used to steal AI models running on many different devices,” Kurian says. “As long as the attacker knows the device they want to steal from, can access the device while it is running an AI model, and has access to another device with the same specifications, this technique should work.”

The technique used in this demonstration relies on monitoring electromagnetic signals. Specifically, the researchers placed an electromagnetic probe on top of a TPU chip. The probe provides real-time data on changes in the electromagnetic field of the TPU during AI processing.

“The electromagnetic data from the sensor essentially gives us a ‘signature’ of the AI processing behavior,” Kurian says. “That’s the easy part.”

To determine the AI model’s architecture and layer details, the researchers compare the electromagnetic signature of the model to a database of other AI model signatures made on an identical device—meaning another Google Edge TPU, in this case.

How can the researchers “steal” an AI model for which they don’t already have a signature? That’s where things get tricky.

The researchers have a technique that allows them to estimate the number of layers in the targeted AI model. Layers are a series of sequential operations that the AI model performs, with the result of each operation informing the following operation. Most AI models have 50 to 242 layers.

“Rather than trying to recreate a model’s entire electromagnetic signature, which would be computationally overwhelming, we break it down by layer,” Kurian says. “We already have a collection of 5,000 first-layer signatures from other AI models. So we compare the stolen first layer signature to the first layer signatures in our database to see which one matches most closely.

“Once we’ve reverse-engineered the first layer, that informs which 5,000 signatures we select to compare with the second layer,” Kurian says. “And this process continues until we’ve reverse-engineered all of the layers and have effectively made a copy of the AI model.”

In their demonstration, the researchers showed that this technique was able to recreate a stolen AI model with 99.91% accuracy.

“Now that we’ve defined and demonstrated this vulnerability, the next step is to develop and implement countermeasures to protect against it,” says Aysu.

More information:
Ashley Kurian et al, TPUXtract: An Exhaustive Hyperparameter Extraction Framework, IACR Transactions on Cryptographic Hardware and Embedded Systems (2024). DOI: 10.46586/tches.v2025.i1.78-103

Provided by
North Carolina State University

Citation:
Stealing AI models: New technique enables theft without hacking into a device (2024, December 12)
retrieved 12 December 2024
from https://techxplore.com/news/2024-12-ai-technique-enables-theft-hacking.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Previous Post

Syrian Activists Feared Assad’s Retaliation. His Fall Frees Them to Speak Openly.

Next Post

Visiting FCDO adviser reiterates UK’s commitment to strengthening partnerships in innovation, research – EnviroNews

Next Post
Visiting FCDO adviser reiterates UK’s commitment to strengthening partnerships in innovation, research – EnviroNews

Visiting FCDO adviser reiterates UK’s commitment to strengthening partnerships in innovation, research - EnviroNews

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED NEWS

Russia Downs 34 Drones in Biggest Ukrainian Attack on Moscow

Russia Downs 34 Drones in Biggest Ukrainian Attack on Moscow

1 year ago
Do This Exercise for Healthy Money Habits in 2024 and Beyond

Do This Exercise for Healthy Money Habits in 2024 and Beyond

2 years ago
Experts urge use of AI to strengthen agriculture, energy resilience in Africa – EnviroNews

Experts urge use of AI to strengthen agriculture, energy resilience in Africa – EnviroNews

5 months ago
Bayelsa: NGOs unite against oil exploration impact on Oloibiri communities – EnviroNews

Bayelsa: NGOs unite against oil exploration impact on Oloibiri communities – EnviroNews

3 months ago

POPULAR NEWS

  • Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    0 shares
    Share 0 Tweet 0
  • The world’s top 10 most valuable car brands in 2025

    0 shares
    Share 0 Tweet 0
  • Top 10 African countries with the highest GDP per capita in 2025

    0 shares
    Share 0 Tweet 0
  • Global ranking of Top 5 smartphone brands in Q3, 2024

    0 shares
    Share 0 Tweet 0
  • When Will SHIB Reach $1? Here’s What ChatGPT Says

    0 shares
    Share 0 Tweet 0

Get strategic intelligence you won’t find anywhere else. Subscribe to the Limitless Beliefs Newsletter for monthly insights on overlooked business opportunities across Africa.

Subscription Form

© 2026 LBNN – All rights reserved.

Privacy Policy | About Us | Contact

Tiktok Youtube Telegram Instagram Linkedin X-twitter
No Result
View All Result
  • Home
  • Business
  • Politics
  • Markets
  • Crypto
  • Economics
    • Manufacturing
    • Real Estate
    • Infrastructure
  • Finance
  • Energy
  • Creator Economy
  • Wealth Management
  • Taxes
  • Telecoms
  • Military & Defense
  • Careers
  • Technology
  • Artificial Intelligence
  • Investigative journalism
  • Art & Culture
  • LBNN Blueprints
  • Quizzes
    • Enneagram quiz
  • Fashion Intelligence

© 2023 LBNN - All rights reserved.