DSE-Based Hardware Trojan Attack for Neural Network Accelerators on FPGAs

被引:0
|
作者
Guo, Chao [1 ]
Yanagisawa, Masao [1 ]
Shi, Youhua [1 ]
机构
[1] Waseda Univ, Fac Fundamental Sci & Engn, Dept Elect & Phys Syst, Tokyo 1698555, Japan
关键词
Hardware; Field programmable gate arrays; Accuracy; Computational modeling; Security; Trojan horses; Software; Kernel; Computer architecture; Degradation; Deep neural networks (DNNs); design space exploration (DSE); hardware Trojan (HT); multi-FPGA;
D O I
10.1109/TNNLS.2024.3482364
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the past few years, the emergence and development of design space exploration (DSE) have shortened the deployment cycle of deep neural networks (DNNs). As a result, with these open-sourced DSE, we can automatically compute the optimal configuration and generate the corresponding accelerator intellectual properties (IPs) from the pretrained neural network models and hardware constraints. However, to date, the security of DSE has received little attention. Therefore, we explore this issue from an adversarial perspective and propose an automated hardware Trojan (HT) generation framework embedded within DSE. The framework uses an evolutionary algorithm (EA) to analyze user-input data to automatically generate the attack code before placing it in the final output accelerator IPs. The proposed HT is sufficiently stealthy and suitable for both single and multifield-programmable gate array (FPGA) designs. It can also implement controlled accuracy degradation attacks and specified category attacks. We conducted experiments on LeNet, VGG-16, and YOLO, respectively, and found that for the LeNet model trained on the CIFAR-10 dataset, attacking only one kernel resulted in 97.3% of images being classified in the category specified by the adversary and reduced accuracy by 59.58%. Moreover, for the VGG-16 model trained on the ImageNet dataset, attacking eight kernels can cause up to 96.53% of the images to be classified into the category specified by the adversary and causes the model's accuracy to decrease to 2.5%. Finally, for the YOLO model trained on the PASCAL VOC dataset, attacking with eight kernels can cause the model to identify the target as the specified category and cause slight perturbations to the bounding boxes. Compared to the un-compromised designs, the look-up tables (LUTs) overhead of the proposed HT design does not exceed 0.6%.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] A Survey of Network-Based Hardware Accelerators
    Skliarova, Iouliia
    ELECTRONICS, 2022, 11 (07)
  • [32] An Automated Design Flow for Adaptive Neural Network Hardware Accelerators
    Francesco Ratto
    Ángela Porras Máinez
    Carlo Sau
    Paolo Meloni
    Gianfranco Deriu
    Stefano Delucchi
    Massimo Massa
    Luigi Raffo
    Francesca Palumbo
    Journal of Signal Processing Systems, 2023, 95 : 1091 - 1113
  • [33] Surrogate Model based Co-Optimization of Deep Neural Network Hardware Accelerators
    Woehrle, Hendrik
    Alvarez, Mariela De Lucas
    Schlenke, Fabian
    Walsemann, Alexander
    Karagounis, Michael
    Kirchner, Frank
    2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2021, : 40 - 45
  • [34] Implementation of the SoftMax Activation for Reconfigurable Neural Network Hardware Accelerators
    Shatravin, Vladislav
    Shashev, Dmitriy
    Shidlovskiy, Stanislav
    APPLIED SCIENCES-BASEL, 2023, 13 (23):
  • [35] An Automated Design Flow for Adaptive Neural Network Hardware Accelerators
    Ratto, Francesco
    Mainez, Angela Porras
    Sau, Carlo
    Meloni, Paolo
    Deriu, Gianfranco
    Delucchi, Stefano
    Massa, Massimo
    Raffo, Luigi
    Palumbo, Francesca
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2023, 95 (09): : 1091 - 1113
  • [36] Hardware Approximate Techniques for Deep Neural Network Accelerators: A Survey
    Armeniakos, Giorgos
    Zervakis, Georgios
    Soudris, Dimitrios
    Henkel, Joerg
    ACM COMPUTING SURVEYS, 2023, 55 (04)
  • [37] Efficient Hardware Approximation for Bit-Decomposition Based Deep Neural Network Accelerators
    Soliman, Taha
    Eldebiky, Amro
    De La Parra, Cecilia
    Guntoro, Andre
    Wehn, Norbert
    2022 IEEE 35TH INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (IEEE SOCC 2022), 2022, : 77 - 82
  • [38] Fault attack hardware Trojan detection method based on ring oscillator
    Bi, Qiangjia
    Wu, Ning
    Zhou, Fang
    Zhang, Jinbao
    Yahya, Muhammad Rehan
    Ge, Fen
    IEICE ELECTRONICS EXPRESS, 2019, 16 (08)
  • [39] Optimized Lightweight Hardware Trojan-based Fault Attack on DES
    Zhang, Fan
    Zhang, Yiran
    Shi, Shengwen
    Guo, Shize
    Liang, Ziyuan
    Qureshi, Samiya
    Xu, Congyuan
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 654 - 661
  • [40] Hardware implementation of a fault-tolerant Hopfield Neural Network on FPGAs
    Antonio Clemente, Juan
    Mansour, Wassim
    Ayoubi, Rafic
    Serrano, Felipe
    Mecha, Hortensia
    Ziade, Haissam
    El Falou, Wassim
    Velazco, Raoul
    NEUROCOMPUTING, 2016, 171 : 1606 - 1609