DSE-Based Hardware Trojan Attack for Neural Network Accelerators on FPGAs

被引:0
|
作者
Guo, Chao [1 ]
Yanagisawa, Masao [1 ]
Shi, Youhua [1 ]
机构
[1] Waseda Univ, Fac Fundamental Sci & Engn, Dept Elect & Phys Syst, Tokyo 1698555, Japan
关键词
Hardware; Field programmable gate arrays; Accuracy; Computational modeling; Security; Trojan horses; Software; Kernel; Computer architecture; Degradation; Deep neural networks (DNNs); design space exploration (DSE); hardware Trojan (HT); multi-FPGA;
D O I
10.1109/TNNLS.2024.3482364
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the past few years, the emergence and development of design space exploration (DSE) have shortened the deployment cycle of deep neural networks (DNNs). As a result, with these open-sourced DSE, we can automatically compute the optimal configuration and generate the corresponding accelerator intellectual properties (IPs) from the pretrained neural network models and hardware constraints. However, to date, the security of DSE has received little attention. Therefore, we explore this issue from an adversarial perspective and propose an automated hardware Trojan (HT) generation framework embedded within DSE. The framework uses an evolutionary algorithm (EA) to analyze user-input data to automatically generate the attack code before placing it in the final output accelerator IPs. The proposed HT is sufficiently stealthy and suitable for both single and multifield-programmable gate array (FPGA) designs. It can also implement controlled accuracy degradation attacks and specified category attacks. We conducted experiments on LeNet, VGG-16, and YOLO, respectively, and found that for the LeNet model trained on the CIFAR-10 dataset, attacking only one kernel resulted in 97.3% of images being classified in the category specified by the adversary and reduced accuracy by 59.58%. Moreover, for the VGG-16 model trained on the ImageNet dataset, attacking eight kernels can cause up to 96.53% of the images to be classified into the category specified by the adversary and causes the model's accuracy to decrease to 2.5%. Finally, for the YOLO model trained on the PASCAL VOC dataset, attacking with eight kernels can cause the model to identify the target as the specified category and cause slight perturbations to the bounding boxes. Compared to the un-compromised designs, the look-up tables (LUTs) overhead of the proposed HT design does not exceed 0.6%.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Detection Method of Hardware Trojan Based on Wavelet Noise Reduction and Neural Network
    Li, Xiaopeng
    Xiao, Fei
    Li, Ling
    Shen, Jiangjiang
    Qian, Fengchen
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 256 - 265
  • [22] INFECT: INiconspicuous FEC-based Trojan: a Hardware Attack on an 802.11 a/g Wireless Network
    Subramani, Kiruba Sankaran
    Antonopoulos, Angelos
    Abotabl, Ahmed Attia
    Nosratinia, Aria
    Makris, Yiorgos
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 90 - 94
  • [23] Memory Requirements for Convolutional Neural Network Hardware Accelerators
    Siu, Kevin
    Stuart, Dylan Malone
    Mahmoud, Mostafa
    Moshovos, Andreas
    2018 IEEE INTERNATIONAL SYMPOSIUM ON WORKLOAD CHARACTERIZATION (IISWC), 2018, : 111 - 121
  • [24] Vessel Identification using Convolutional Neural Network-based Hardware Accelerators
    Boyer, Alexandre
    Abiemona, Rami
    Bolic, Miodrag
    Petriu, Emil
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND VIRTUAL ENVIRONMENTS FOR MEASUREMENT SYSTEMS AND APPLICATIONS (IEEE CIVEMSA 2021), 2021,
  • [25] Hardware Trojan Detection for Gate-level Netlists Based on Graph Neural Network
    Shi J.
    Wen C.
    Liu H.
    Wang Z.
    Zhang S.
    Peijun M.A.
    Kang L.I.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2023, 45 (09): : 3253 - 3262
  • [26] Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms
    Fu, Weimin
    Yu, Honggang
    Arias, Orlando
    Yang, Kaichen
    Jin, Yier
    Yavuz, Tuba
    Guo, Xiaolong
    Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI, 2022, : 481 - 486
  • [27] A power traces based hardware trojan detection using deep artificial neural network
    Mohanraj, Priyadharshini
    Paramasivam, Saravanan
    Sathyamoorthy, Prashanth
    ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING, 2025, 123 (01)
  • [28] Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms
    Fu, Weimin
    Yu, Honggang
    Arias, Orlando
    Yang, Kaichen
    Jin, Yier
    Yavuz, Tuba
    Guo, Xiaolong
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 481 - 486
  • [29] A neural network framework based on ConvNeXt for side-channel hardware Trojan detection
    Gao, Yuchan
    Su, Jing
    Li, Jia
    Wang, Shenglong
    Li, Chao
    ETRI JOURNAL, 2024,
  • [30] Particle Swarm Optimization-Driven DSE-Based Low-Cost Hardware Security for Securing DSP IP Cores
    Rathor, Mahendra
    Sengupta, Anirban
    EAI/Springer Innovations in Communication and Computing, 2022, : 29 - 54