Technologist Mag
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
Anthropic Says That Claude Contains Its Own Kind of Emotions

Anthropic Says That Claude Contains Its Own Kind of Emotions

2 April 2026
Prime Video expands sign language support to 18 more movies and here’s the complete list

Prime Video expands sign language support to 18 more movies and here’s the complete list

2 April 2026
The First Three Resident Evil Titles And Breath Of Fire IV Are Now Available On Steam

The First Three Resident Evil Titles And Breath Of Fire IV Are Now Available On Steam

2 April 2026
Review: Apple iPad Air (2026, M4)

Review: Apple iPad Air (2026, M4)

2 April 2026
Anker Solix E10 Whole-Home Backup System Review:  Power That Actually Fits Your Life

Anker Solix E10 Whole-Home Backup System Review:  Power That Actually Fits Your Life

2 April 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Technologist Mag
SUBSCRIBE
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release
Technologist Mag
Home » This new AI attack steals models without touching the system
Tech News

This new AI attack steals models without touching the system

By technologistmag.com2 April 20262 Mins Read
This new AI attack steals models without touching the system
Share
Facebook Twitter Reddit Telegram Pinterest Email

AI systems have long been treated like sealed black boxes, especially in areas like facial recognition and autonomous driving. New research suggests that protection isn’t as solid as assumed.

A KAIST-led team shows that AI systems can be reverse engineered remotely using emissions that leak during normal operation, without direct intrusion. Instead, the approach listens.

Using a small antenna, the researchers captured faint electromagnetic traces from GPUs and rebuilt how the system was designed. It sounds like a heist trick, but the results hold up, and the security implications are immediate.

How the side channel works

The system, called ModelSpy, collects electromagnetic output produced while GPUs handle AI workloads These traces are subtle, yet they follow patterns tied to how the architecture is arranged.

By analyzing those patterns, the team inferred key details, including layer setups and parameter choices. Tests showed core structures could be identified with up to 97.6 percent accuracy.

The setup is what makes this unsettling. The antenna fits inside a bag and doesn’t need physical access. It worked from as far as six meters away, even through walls, across multiple GPU types. Computation itself becomes a side channel, exposing the system’s design without a traditional breach.

Why this changes AI security

This pushes AI security into less familiar territory. Most defenses focus on software exploits or network access. ModelSpy targets the physical byproducts of computation instead.

Even isolated systems could leak sensitive information if hardware emissions aren’t controlled. For companies, that architecture is often core intellectual property, which turns this into a direct business risk.

ransomware

The work frames this as a cyber physical challenge, where defending AI now involves both digital safeguards and the surrounding environment, which raises the bar for what protection actually means.

What defenses look like now

The team also outlined ways to reduce the risk, including adding electromagnetic noise and adjusting how computations run so patterns become harder to interpret

Those fixes suggest a broader change. Securing AI may require hardware level adjustments, not just software updates, which complicates deployment for industries already locked into existing systems.

The research earned recognition at a major security conference, signaling how seriously this threat is being taken. The next exposure may not involve breaking in at all, but simply observing what systems unintentionally reveal.

Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticlePut an End to Chapped Lips and Pained Nostrils With the Best Humidifiers
Next Article I Took RFK Jr.’s Advice and Ate Nothing but High-Protein Foods for a Week

Related Articles

Anthropic Says That Claude Contains Its Own Kind of Emotions

Anthropic Says That Claude Contains Its Own Kind of Emotions

2 April 2026
Prime Video expands sign language support to 18 more movies and here’s the complete list

Prime Video expands sign language support to 18 more movies and here’s the complete list

2 April 2026
Review: Apple iPad Air (2026, M4)

Review: Apple iPad Air (2026, M4)

2 April 2026
Anker Solix E10 Whole-Home Backup System Review:  Power That Actually Fits Your Life

Anker Solix E10 Whole-Home Backup System Review:  Power That Actually Fits Your Life

2 April 2026
Gas Prices Are Soaring. So Is the Demand for Used EVs

Gas Prices Are Soaring. So Is the Demand for Used EVs

2 April 2026
Steam survey shows Linux hitting an all-time high with gamers

Steam survey shows Linux hitting an all-time high with gamers

2 April 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Don't Miss
Prime Video expands sign language support to 18 more movies and here’s the complete list

Prime Video expands sign language support to 18 more movies and here’s the complete list

By technologistmag.com2 April 2026

Prime Video is expanding its sign language support, adding 18 more Prime Original titles starting…

The First Three Resident Evil Titles And Breath Of Fire IV Are Now Available On Steam

The First Three Resident Evil Titles And Breath Of Fire IV Are Now Available On Steam

2 April 2026
Review: Apple iPad Air (2026, M4)

Review: Apple iPad Air (2026, M4)

2 April 2026
Anker Solix E10 Whole-Home Backup System Review:  Power That Actually Fits Your Life

Anker Solix E10 Whole-Home Backup System Review:  Power That Actually Fits Your Life

2 April 2026
Ascenders: Beyond The Peak Blends Mountain Climbing, Roguelite Gameplay, And Lovecraftian Horror

Ascenders: Beyond The Peak Blends Mountain Climbing, Roguelite Gameplay, And Lovecraftian Horror

2 April 2026
Technologist Mag
Facebook X (Twitter) Instagram Pinterest
  • Privacy
  • Terms
  • Advertise
  • Contact
© 2026 Technologist Mag. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.