Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to Security in TinyML
- Security challenges in resource-constrained ML systems
- Threat models for TinyML deployments
- Risk categories for embedded AI applications
Data Privacy in Edge AI
- Privacy considerations for on-device data processing
- Minimizing data exposure and transfer
- Techniques for decentralized data handling
Adversarial Attacks on TinyML Models
- Model evasion and poisoning threats
- Input manipulation on embedded sensors
- Assessing vulnerability in constrained environments
Security Hardening for Embedded ML
- Firmware and hardware protection layers
- Access control and secure boot mechanisms
- Best practices for safeguarding inference pipelines
Privacy-Preserving TinyML Techniques
- Quantization and model design considerations for privacy
- Techniques for on-device anonymization
- Lightweight encryption and secure computation methods
Secure Deployment and Maintenance
- Secure provisioning of TinyML devices
- OTA updates and patching strategies
- Monitoring and incident response at the edge
Testing and Validation of Secure TinyML Systems
- Security and privacy testing frameworks
- Simulating real-world attack scenarios
- Validation and compliance considerations
Case Studies and Applied Scenarios
- Security failures in edge AI ecosystems
- Designing resilient TinyML architectures
- Evaluating trade-offs between performance and protection
Summary and Next Steps
Requirements
- An understanding of embedded system architectures
- Experience with machine learning workflows
- Knowledge of cybersecurity fundamentals
Audience
- Security analysts
- AI developers
- Embedded engineers
21 Hours