Analysis Artefacts -- Double-Strike: Breaking Approximation-based Side-Channel Countermeasures for DNNs
Authors/Creators
Contributors
Project leader:
Project members:
-
1.
Centre National de la Recherche Scientifique
-
2.
National Institute for Research in Computer and Control Sciences
-
3.
Institut de Recherche en Informatique et Systèmes Aléatoires
-
4.
CentraleSupélec
-
5.
Laboratoire des Sciences et Techniques de l'Information de la Communication et de la Connaissance
-
6.
Université de Bretagne Sud
- 7. INSA Rennes
-
8.
Université Rennes 1
-
9.
Institut d'Électronique et des Technologies du numéRique
Description
# Analysis Artefacts for the Research Paper: "Double Strike: Breaking Approximation-based Side-Channel Countermeasures for DNNs"
This archive contains, for each studied implementation, the:
- Side-channel traces;
- Inputs;
- Random values fed to the MACPruning mechanism to skip the non-important;
weights (only for the protected implementation);
- Sequence of executed MAC/important weights (only for the
circumvented/protected implementation);
- Parameters characterising each side-channel acquisition.
This archive complements the published code artefacts ("https://github.com/DoktorC/double-strike-host2026") for the paper
"Double Strike: Breaking Approximation-based Side-Channel Countermeasures for DNNs" (To appear in HOST 2026).
Files
Files
(40.9 GB)
| Name | Size | Download all |
|---|---|---|
|
md5:f812b1086cb21daf9abf80a53aecd45a
|
40.9 GB | Download |
Additional details
Related works
- Is supplement to
- Software: 10.5281/zenodo.17969535 (DOI)
Funding
- Agence Nationale de la Recherche
- ATTILA - Addressing securiTy Threats to artIficiaL intelligence in Approximate computing systems ANR-21-CE39-0018
Software
- Repository URL
- https://github.com/DoktorC/double-strike-host2026
- Programming language
- Python , C , Shell
- Development Status
- Concept