DSE-Based Hardware Trojan Attack for Neural Network Accelerators on FPGAs

被引:0
|
作者
Guo, Chao [1 ]
Yanagisawa, Masao [1 ]
Shi, Youhua [1 ]
机构
[1] Waseda Univ, Fac Fundamental Sci & Engn, Dept Elect & Phys Syst, Tokyo 1698555, Japan
关键词
Hardware; Field programmable gate arrays; Accuracy; Computational modeling; Security; Trojan horses; Software; Kernel; Computer architecture; Degradation; Deep neural networks (DNNs); design space exploration (DSE); hardware Trojan (HT); multi-FPGA;
D O I
10.1109/TNNLS.2024.3482364
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the past few years, the emergence and development of design space exploration (DSE) have shortened the deployment cycle of deep neural networks (DNNs). As a result, with these open-sourced DSE, we can automatically compute the optimal configuration and generate the corresponding accelerator intellectual properties (IPs) from the pretrained neural network models and hardware constraints. However, to date, the security of DSE has received little attention. Therefore, we explore this issue from an adversarial perspective and propose an automated hardware Trojan (HT) generation framework embedded within DSE. The framework uses an evolutionary algorithm (EA) to analyze user-input data to automatically generate the attack code before placing it in the final output accelerator IPs. The proposed HT is sufficiently stealthy and suitable for both single and multifield-programmable gate array (FPGA) designs. It can also implement controlled accuracy degradation attacks and specified category attacks. We conducted experiments on LeNet, VGG-16, and YOLO, respectively, and found that for the LeNet model trained on the CIFAR-10 dataset, attacking only one kernel resulted in 97.3% of images being classified in the category specified by the adversary and reduced accuracy by 59.58%. Moreover, for the VGG-16 model trained on the ImageNet dataset, attacking eight kernels can cause up to 96.53% of the images to be classified into the category specified by the adversary and causes the model's accuracy to decrease to 2.5%. Finally, for the YOLO model trained on the PASCAL VOC dataset, attacking with eight kernels can cause the model to identify the target as the specified category and cause slight perturbations to the bounding boxes. Compared to the un-compromised designs, the look-up tables (LUTs) overhead of the proposed HT design does not exceed 0.6%.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Memory Trojan Attack on Neural Network Accelerators
    Zhao, Yang
    Hu, Xing
    Li, Shuangchen
    Ye, Jing
    Deng, Lei
    Ji, Yu
    Xu, Jianyu
    Wu, Dong
    Xie, Yuan
    2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, : 1415 - 1420
  • [2] Novel Hardware Trojan Attack on Activation Parameters of FPGA-Based DNN Accelerators
    Mukherjee, Rijoy
    Chakraborty, Rajat Subhra
    IEEE EMBEDDED SYSTEMS LETTERS, 2022, 14 (03) : 131 - 134
  • [3] Hardware Trojan Detection Based on ELM Neural Network
    Wang, Sixiang
    Dong, Xiuze
    Sun, Kewang
    Cui, Qi
    Li, Dongxu
    He, Chunxiao
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 400 - 403
  • [4] Thermal Sensor Based Hardware Trojan Detection in FPGAs
    Pyrgas, Lampros
    Pirpilidis, Filippos
    Panayiotarou, Aliki
    Kitsos, Paris
    2017 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2017, : 268 - 273
  • [5] A Novel Hardware Trojan Detection Based on BP Neural Network
    Li, Jun
    Chen, Jihua
    Ni, Lin
    Zhou, Errui
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2790 - 2794
  • [6] Hardware Trojan Detection Technique Based on SOM Neural Network
    Wen, Ning
    Wang, Jian
    Zhang, Tao
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1645 - 1648
  • [7] GramsDet: Hardware Trojan Detection Based on Recurrent Neural Network
    Lu, Renjie
    Shen, Haihua
    Su, Yu
    Li, Huawei
    Li, Xiaowei
    2019 IEEE 28TH ASIAN TEST SYMPOSIUM (ATS), 2019, : 111 - 116
  • [8] An overview memristor based hardware accelerators for deep neural network
    Gokgoz, Baki
    Gul, Fatih
    Aydin, Tolga
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (09):
  • [9] Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators
    Xu, Hongye
    Liu, Dongfang
    Merkel, Cory
    Zuzak, Michael
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2023, GLSVLSI 2023, 2023, : 351 - 356
  • [10] Neural network implementation in hardware using FPGAs
    Sahin, Suhap
    Becerikli, Yasar
    Yazici, Suleyman
    NEURAL INFORMATION PROCESSING, PT 3, PROCEEDINGS, 2006, 4234 : 1105 - 1112