A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator

被引:0
|
作者
Liu, Zichu [1 ]
Hou, Jia [1 ]
Wang, Jianfei [1 ]
Yang, Chen [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Microelect, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
reconfigurable CNN accelerator; hardware Trojans; security protection scheme;
D O I
10.3390/cryptography8030034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also witnessed a rise in hardware Trojan attacks targeted at CNN accelerators, thereby posing substantial threats to the reliability and security of these reconfigurable systems. Despite this escalating concern, there exists a scarcity of security protection schemes explicitly tailored to counteract hardware Trojans embedded in reconfigurable CNN accelerators, and those that do exist exhibit notable deficiencies. Addressing these gaps, this paper introduces a dedicated security scheme designed to mitigate the vulnerabilities associated with hardware Trojans implanted in reconfigurable CNN accelerators. The proposed security protection scheme operates at two distinct levels: the first level is geared towards preventing the triggering of the hardware Trojan, while the second level focuses on detecting the presence of a hardware Trojan post-triggering and subsequently neutralizing its potential harm. Through experimental evaluation, our results demonstrate that this two-level protection scheme is capable of mitigating at least 99.88% of the harm cause by three different types of hardware Trojan (i.e., Trojan within RI, MAC and ReLU) within reconfigurable CNN accelerators. Furthermore, this scheme can prevent hardware Trojans from triggering whose trigger signal is derived from a processing element (PE). Notably, the proposed scheme is implemented and validated on a Xilinx Zynq XC7Z100 platform.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] AIScale - A Coarse Grained Reconfigurable CNN Hardware Accelerator
    Struharik, Rastislav
    Vukobratovic, Bogdan
    2017 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), 2017,
  • [2] A Microprocessor Protection Architecture against Hardware Trojans in Memories
    Bolat, Alperen
    Cassano, Luca
    Reviriego, Pedro
    Ergin, Oguz
    Ottavi, Marco
    Proceedings - 2020 15th IEEE International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2020, 2020,
  • [3] A Microprocessor Protection Architecture against Hardware Trojans in Memories
    Bolat, Alperen
    Cassano, Luca
    Reviriego, Pedro
    Ergin, Oguz
    Ottavi, Marco
    2020 15TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2020), 2020,
  • [4] Algorithm and Hardware Co-design for Reconfigurable CNN Accelerator
    Fan, Hongxiang
    Ferianc, Martin
    Que, Zhiqiang
    Li, He
    Liu, Shuanglong
    Niu, Xinyu
    Luk, Wayne
    27TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2022, 2022, : 250 - 255
  • [5] A Novel Method Against Hardware Trojans in Approximate Circuits
    Dou, Yuqin
    Gu, Chongyan
    Wang, Chenghua
    Liu, Weiqing
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 632 - 637
  • [6] DRMaSV: Enhanced Capability Against Hardware Trojans in Coarse Grained Reconfigurable Architectures
    Liu, Leibo
    Zhou, Zhuoquan
    Wei, Shaojun
    Zhu, Min
    Yin, Shouyi
    Mao, Shengyang
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (04) : 782 - 795
  • [7] QUKU: A two-level reconfigurable architecture
    Shukla, Sunil
    Bergmann, Neil W.
    Becker, Jurgen
    IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, PROCEEDINGS: EMERGING VLSI TECHNOLOGIES AND ARCHITECTURES, 2006, : 109 - +
  • [8] On the design of two-level reconfigurable architectures
    Lange, S
    Middendorf, MT
    2005 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG 2005), 2005, : 61 - 68
  • [9] Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip
    Bobda, Christophe
    Mead, Joshua
    Whitaker, Taylor J. L.
    Kamhoua, Charles
    Kwiat, Kevin
    APPLIED RECONFIGURABLE COMPUTING, 2017, 10216 : 47 - 59
  • [10] Novel two-level tracing scheme using clustering algorithm
    Chaabane, Faten
    Charfeddine, Maha
    Ben Amar, Chokri
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2016, 11 (04): : 179 - 189