Technologist Mag
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
A Fundamental Principle of Aeronautical Engineering Has Been Overturned

A Fundamental Principle of Aeronautical Engineering Has Been Overturned

24 May 2026
Corsair is putting for Chinese RAM in mainstream market, it won’t quite end the crisis though

Corsair is putting for Chinese RAM in mainstream market, it won’t quite end the crisis though

24 May 2026
These Robots Are Making Meals for a Nonprofit in San Francisco’s Tenderloin

These Robots Are Making Meals for a Nonprofit in San Francisco’s Tenderloin

24 May 2026
The Best Browser Extensions to Get More Out of YouTube

The Best Browser Extensions to Get More Out of YouTube

24 May 2026
Good Lock is why I keep coming back to the Galaxy S26

Good Lock is why I keep coming back to the Galaxy S26

24 May 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Technologist Mag
SUBSCRIBE
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release
Technologist Mag
Home » This new AI attack steals models without touching the system
Tech News

This new AI attack steals models without touching the system

By technologistmag.com2 April 20262 Mins Read
This new AI attack steals models without touching the system
Share
Facebook Twitter Reddit Telegram Pinterest Email

AI systems have long been treated like sealed black boxes, especially in areas like facial recognition and autonomous driving. New research suggests that protection isn’t as solid as assumed.

A KAIST-led team shows that AI systems can be reverse engineered remotely using emissions that leak during normal operation, without direct intrusion. Instead, the approach listens.

Using a small antenna, the researchers captured faint electromagnetic traces from GPUs and rebuilt how the system was designed. It sounds like a heist trick, but the results hold up, and the security implications are immediate.

How the side channel works

The system, called ModelSpy, collects electromagnetic output produced while GPUs handle AI workloads These traces are subtle, yet they follow patterns tied to how the architecture is arranged.

By analyzing those patterns, the team inferred key details, including layer setups and parameter choices. Tests showed core structures could be identified with up to 97.6 percent accuracy.

The setup is what makes this unsettling. The antenna fits inside a bag and doesn’t need physical access. It worked from as far as six meters away, even through walls, across multiple GPU types. Computation itself becomes a side channel, exposing the system’s design without a traditional breach.

Why this changes AI security

This pushes AI security into less familiar territory. Most defenses focus on software exploits or network access. ModelSpy targets the physical byproducts of computation instead.

Even isolated systems could leak sensitive information if hardware emissions aren’t controlled. For companies, that architecture is often core intellectual property, which turns this into a direct business risk.

ransomware

The work frames this as a cyber physical challenge, where defending AI now involves both digital safeguards and the surrounding environment, which raises the bar for what protection actually means.

What defenses look like now

The team also outlined ways to reduce the risk, including adding electromagnetic noise and adjusting how computations run so patterns become harder to interpret

Those fixes suggest a broader change. Securing AI may require hardware level adjustments, not just software updates, which complicates deployment for industries already locked into existing systems.

The research earned recognition at a major security conference, signaling how seriously this threat is being taken. The next exposure may not involve breaking in at all, but simply observing what systems unintentionally reveal.

Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticlePut an End to Chapped Lips and Pained Nostrils With the Best Humidifiers
Next Article I Took RFK Jr.’s Advice and Ate Nothing but High-Protein Foods for a Week

Related Articles

A Fundamental Principle of Aeronautical Engineering Has Been Overturned

A Fundamental Principle of Aeronautical Engineering Has Been Overturned

24 May 2026
Corsair is putting for Chinese RAM in mainstream market, it won’t quite end the crisis though

Corsair is putting for Chinese RAM in mainstream market, it won’t quite end the crisis though

24 May 2026
These Robots Are Making Meals for a Nonprofit in San Francisco’s Tenderloin

These Robots Are Making Meals for a Nonprofit in San Francisco’s Tenderloin

24 May 2026
The Best Browser Extensions to Get More Out of YouTube

The Best Browser Extensions to Get More Out of YouTube

24 May 2026
Good Lock is why I keep coming back to the Galaxy S26

Good Lock is why I keep coming back to the Galaxy S26

24 May 2026
Topo Designs Rover Trail Pack Is the Best Backpack I’ve Ever Used

Topo Designs Rover Trail Pack Is the Best Backpack I’ve Ever Used

24 May 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Don't Miss
Corsair is putting for Chinese RAM in mainstream market, it won’t quite end the crisis though

Corsair is putting for Chinese RAM in mainstream market, it won’t quite end the crisis though

By technologistmag.com24 May 2026

After years of painfully expensive RAM and SSD prices, the memory market may finally be…

These Robots Are Making Meals for a Nonprofit in San Francisco’s Tenderloin

These Robots Are Making Meals for a Nonprofit in San Francisco’s Tenderloin

24 May 2026
The Best Browser Extensions to Get More Out of YouTube

The Best Browser Extensions to Get More Out of YouTube

24 May 2026
Good Lock is why I keep coming back to the Galaxy S26

Good Lock is why I keep coming back to the Galaxy S26

24 May 2026
Topo Designs Rover Trail Pack Is the Best Backpack I’ve Ever Used

Topo Designs Rover Trail Pack Is the Best Backpack I’ve Ever Used

24 May 2026
Technologist Mag
Facebook X (Twitter) Instagram Pinterest
  • Privacy
  • Terms
  • Advertise
  • Contact
© 2026 Technologist Mag. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.