PermuteV: A Performant Side-channel-Resistant RISC-V Core Securing Edge AI Inference
Nuntipat Narkthong , Xiaolin Xu
Published on arXiv
2512.18132
Model Theft
OWASP ML Top 10 — ML05
Key Finding
PermuteV effectively defeats Correlation Electromagnetic Analysis (CEMA) attacks targeting NN weights with minimal area and runtime overhead compared to prior shuffling-based defenses (13.7%–41.8% overhead).
PermuteV
Novel technique introduced
Edge AI inference is becoming prevalent thanks to the emergence of small yet high-performance microprocessors. This shift from cloud to edge processing brings several benefits in terms of energy savings, improved latency, and increased privacy. On the downside, bringing computation to the edge makes them more vulnerable to physical side-channel attacks (SCA), which aim to extract the confidentiality of neural network models, e.g., architecture and weight. To address this growing threat, we propose PermuteV, a performant side-channel resistant RISC-V core designed to secure neural network inference. PermuteV employs a hardware-accelerated defense mechanism that randomly permutes the execution order of loop iterations, thereby obfuscating the electromagnetic (EM) signature associated with sensitive operations. We implement PermuteV on FPGA and perform evaluations in terms of side-channel security, hardware area, and runtime overhead. The experimental results demonstrate that PermuteV can effectively defend against EM SCA with minimal area and runtime overhead.
Key Contributions
- PermuteV: a RISC-V core with a Loop Index Generator (LIG) module that randomly permutes loop iteration order to obfuscate EM side-channel signatures during NN inference
- Custom RISC-V ISA extensions enabling efficient hardware-accelerated permutation with no extra instructions vs. sequential loops
- LLVM compiler extension that automatically generates permuted loop code, requiring no manual software modifications from developers
🛡️ Threat Analysis
EM side-channel attacks (CEMA) against edge devices explicitly aim to extract neural network model weights and architecture — model IP theft. PermuteV is a hardware-level countermeasure defending against this extraction; ML05 explicitly includes 'side-channel attacks to extract model parameters' and their defenses.