A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator

被引:0
|
作者
Liu, Zichu [1 ]
Hou, Jia [1 ]
Wang, Jianfei [1 ]
Yang, Chen [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Microelect, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
reconfigurable CNN accelerator; hardware Trojans; security protection scheme;
D O I
10.3390/cryptography8030034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also witnessed a rise in hardware Trojan attacks targeted at CNN accelerators, thereby posing substantial threats to the reliability and security of these reconfigurable systems. Despite this escalating concern, there exists a scarcity of security protection schemes explicitly tailored to counteract hardware Trojans embedded in reconfigurable CNN accelerators, and those that do exist exhibit notable deficiencies. Addressing these gaps, this paper introduces a dedicated security scheme designed to mitigate the vulnerabilities associated with hardware Trojans implanted in reconfigurable CNN accelerators. The proposed security protection scheme operates at two distinct levels: the first level is geared towards preventing the triggering of the hardware Trojan, while the second level focuses on detecting the presence of a hardware Trojan post-triggering and subsequently neutralizing its potential harm. Through experimental evaluation, our results demonstrate that this two-level protection scheme is capable of mitigating at least 99.88% of the harm cause by three different types of hardware Trojan (i.e., Trojan within RI, MAC and ReLU) within reconfigurable CNN accelerators. Furthermore, this scheme can prevent hardware Trojans from triggering whose trigger signal is derived from a processing element (PE). Notably, the proposed scheme is implemented and validated on a Xilinx Zynq XC7Z100 platform.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] A new two-level information protection scheme based on visual cryptography and QR code with multiple decryptions
    Fu, Zhengxin
    Cheng, Yuqiao
    Liu, Sijia
    Yu, Bin
    MEASUREMENT, 2019, 141 : 267 - 276
  • [32] Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST
    Dubrova, Elena
    Naslund, Mats
    Carlsson, Gunnar
    Fornehed, John
    Smeets, Ben
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2017, 87 (03): : 371 - 381
  • [33] Two-level reconfigurable architecture for high-performance signal processing
    Johnsson, D
    Bengtsson, J
    Svensson, B
    ERSA '04: THE 2004 INTERNATIONAL CONFERENCE ON ENGINEERING OF RECONFIGURABLE SYSTEMS AND ALGORITHMS, 2004, : 177 - 183
  • [34] Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST
    Elena Dubrova
    Mats Näslund
    Gunnar Carlsson
    John Fornehed
    Ben Smeets
    Journal of Signal Processing Systems, 2017, 87 : 371 - 381
  • [35] Reconfigurable Two-level Process Planning Method for Special Steel Manufacturing
    Liu, Xiaobin
    Yang, Jingping
    Ma, Yue
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 6616 - 6620
  • [36] A Novel Scheme to Minimize Hop Count for GAF in Wireless Sensor Networks: Two-Level GAF
    Soni, Vaibhav
    Mallick, Dheeresh K.
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2015, 2015
  • [37] A novel two-level trust model for grid
    Li, TY
    Zhu, HF
    Lam, KY
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 214 - 225
  • [38] Novel Magnetically Levitated Two-Level Motor
    Karutz, Philipp
    Nussbaumer, Thomas
    Gruber, Wolfgang
    Kolar, Johann W.
    IEEE-ASME TRANSACTIONS ON MECHATRONICS, 2008, 13 (06) : 658 - 668
  • [39] Two-level parallelization of a fluid mechanics algorithm exploiting hardware heterogeneity
    Huismann, Immo
    Stiller, Joerg
    Froehlich, Jochen
    COMPUTERS & FLUIDS, 2015, 117 : 114 - 124
  • [40] A two-level particle swarm optimization: profiling and software/hardware implementation
    Zarrouk, Rim
    Ettouill, Monia
    Jemai, Abderrazek
    SWARM INTELLIGENCE, 2024,