AROMA: Evaluating Deep Learning Systems for Stealthy Integrity Attacks on Multi-tenant Accelerators

被引:0
|
作者
Chen, Xiangru [1 ]
Merugu, Maneesh [1 ]
Zhang, Jiaqi [1 ]
Ray, Sandip [1 ]
机构
[1] Univ Florida, POB 32611, Gainesville, FL 32611 USA
关键词
Integrity attack; neural networks; multi-tenant device; evaluation tool;
D O I
10.1145/3579033
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-tenant applications have been proliferating in recent years, supported by the emergence of computingas-service paradigms. Unfortunately, multi-tenancy induces new security vulnerabilities due to spatial or temporal co-location of applications with possibly malicious intent. In this article, we consider a special class of stealthy integrity attacks on multi-tenant deep learning accelerators. One interesting conclusion is that it is possible to perform targeted integrity attacks on kernel weights of deep learning systems such that it remains functional but mis-labels specific categories of input data through standard RowHammer attacks by only changing 0.0009% of the total weights. We develop an automated framework, AROMA, to evaluate the impact of multi-tenancy on security of deep learning accelerators against integrity attacks on memory systems. We present extensive evaluations on AroMa to demonstrate its effectiveness.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Deep Customization of Multi-Tenant SaaS Using Intrusive Microservices
    Song, Hui
    Chauvel, Franck
    Solberg, Arnor
    2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: NEW IDEAS AND EMERGING TECHNOLOGIES RESULTS (ICSE-NIER), 2018, : 97 - 100
  • [32] Online Scheduling of Distributed Machine Learning Jobs for Incentivizing Sharing in Multi-Tenant Systems
    Wang, Ne
    Zhou, Ruiting
    Han, Ling
    Chen, Hao
    Li, Zongpeng
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (03) : 653 - 667
  • [33] Multi-tenant Cloud SaaS Application for a meeting to task transition via deep learning models
    Walter-Tscharf, Viktor
    2022 IEEE GLOBAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INTERNET OF THINGS (GCAIOT), 2022, : 60 - 66
  • [34] A Deep Investigation on Stealthy DVFS Fault Injection Attacks at DNN Hardware Accelerators
    Xu, Junge
    Zhang, Fan
    Jin, Wenguang
    Yang, Kun
    Wang, Zeke
    Jiang, Weixiong
    Ha, Yajun
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2025, 44 (01) : 39 - 51
  • [35] Scheduling Deep Learning Jobs in Multi-Tenant GPU Clusters via Wise Resource Sharing
    Luo, Yizhou
    Wang, Qiang
    Shi, Shaohuai
    Lai, Jiaxin
    Qi, Shuhan
    Zhang, Jiajia
    Wang, Xuan
    2024 IEEE/ACM 32ND INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE, IWQOS, 2024,
  • [36] Resource allocation for network slicing in dynamic multi-tenant networks: A deep reinforcement learning approach
    Xie, Yanghao
    Kong, Yuyang
    Huang, Lin
    Wang, Sheng
    Xu, Shizhong
    Wang, Xiong
    Ren, Jing
    COMPUTER COMMUNICATIONS, 2022, 195 : 476 - 487
  • [37] A Multi-Tenant Resource Management System for Multi-FPGA Systems
    Yamakura, Miho
    Takano, Ryousei
    Ben Ahmed, Akram
    Sugaya, Midori
    Amano, Hideharu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2021, E104D (12): : 2078 - 2088
  • [38] Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers
    Islam, Mohammad A.
    Ren, Shaolei
    Wierman, Adam
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1079 - 1094
  • [39] Multi-tenant data integrity verification scheme based on B+ tree
    Li, Ying
    Zhang, Yongsheng
    Journal of Computational Information Systems, 2015, 11 (16): : 6111 - 6118
  • [40] RealArch: A Real-Time Scheduler for Mapping Multi-Tenant DNNs on Multi-Core Accelerators
    Wang, Xuhang
    Song, Zhuoran
    Liang, Xiaoyao
    2023 IEEE 41ST INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, ICCD, 2023, : 158 - 165