A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator

被引:0
|
作者
Liu, Zichu [1 ]
Hou, Jia [1 ]
Wang, Jianfei [1 ]
Yang, Chen [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Microelect, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
reconfigurable CNN accelerator; hardware Trojans; security protection scheme;
D O I
10.3390/cryptography8030034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also witnessed a rise in hardware Trojan attacks targeted at CNN accelerators, thereby posing substantial threats to the reliability and security of these reconfigurable systems. Despite this escalating concern, there exists a scarcity of security protection schemes explicitly tailored to counteract hardware Trojans embedded in reconfigurable CNN accelerators, and those that do exist exhibit notable deficiencies. Addressing these gaps, this paper introduces a dedicated security scheme designed to mitigate the vulnerabilities associated with hardware Trojans implanted in reconfigurable CNN accelerators. The proposed security protection scheme operates at two distinct levels: the first level is geared towards preventing the triggering of the hardware Trojan, while the second level focuses on detecting the presence of a hardware Trojan post-triggering and subsequently neutralizing its potential harm. Through experimental evaluation, our results demonstrate that this two-level protection scheme is capable of mitigating at least 99.88% of the harm cause by three different types of hardware Trojan (i.e., Trojan within RI, MAC and ReLU) within reconfigurable CNN accelerators. Furthermore, this scheme can prevent hardware Trojans from triggering whose trigger signal is derived from a processing element (PE). Notably, the proposed scheme is implemented and validated on a Xilinx Zynq XC7Z100 platform.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] A two-level patching scheme for video multicast
    Guan, DL
    Yu, SY
    ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, : 289 - 293
  • [22] Implementing hybrid operating systems with two-level hardware interrupts
    Liu, Miao
    Shao, Zili
    Wang, Meng
    Wei, Hongxing
    Wang, Tianmiao
    RTSS 2007: 28TH IEEE INTERNATIONAL REAL-TIME SYSTEMS SYMPOSIUM, PROCEEDINGS, 2007, : 244 - +
  • [23] A Two-Level Routing Scheme for Wireless Sensor Network
    Shi, Jinglun
    Shan, Zhilong
    Liu, Xuxun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [24] Analysis of Multiphoton Transitions within the Two-Level Scheme
    T. I. Kuznetsova
    Bulletin of the Lebedev Physics Institute, 2022, 49 : 440 - 443
  • [25] Cache Coordination Scheme Based on Two-level Cache
    Liu, Jia-Qi
    Zhang, Ya-Wen
    Zhang, Han-Wen
    Meng, Xu-Ying
    Zhou, Ji-Hua
    Zhang, Yu-Jun
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (09): : 2963 - 2976
  • [26] Two-level classifier scheme for efficient eye location
    Wang, Xi
    Kang, Sung Kwan
    Rhee, Phill Kyu
    PROCEEDINGS OF THE FRONTIERS IN THE CONVERGENCE OF BIOSCIENCE AND INFORMATION TECHNOLOGIES, 2007, : 740 - 745
  • [27] A two-level optimal distributed monitoring scheme for mesh
    Wang, DJ
    INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATION TECHNOLOGIES : EXPLORING EMERGING TECHNOLOGIES, 2001, : 151 - 156
  • [28] Fault Sensitive Neutralization of Hardware Trojans using Multi-level Triple Modular Redundancy Scheme
    Gunti, Nagendra Babu
    Lingasubramanian, Karthikeyan
    2017 3RD IEEE INTERNATIONAL SYMPOSIUM ON NANOELECTRONIC AND INFORMATION SYSTEMS (INIS), 2017, : 105 - 110
  • [29] Analysis of Multiphoton Transitions within the Two-Level Scheme
    Kuznetsova, T. I.
    BULLETIN OF THE LEBEDEV PHYSICS INSTITUTE, 2022, 49 (12) : 440 - 443
  • [30] A Two-level Cooperative Clustering Scheme for Vehicular Communications
    Calvo, Jose Angel Leon
    Mathar, Rudolf
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND MANAGEMENT (ICICM 2016), 2016, : 205 - 210