Security Threat Analyses and Attack Models for Approximate Computing Systems: From Hardware and Micro-architecture Perspectives

被引:0
|
作者
Yellu, Pruthvy [1 ]
Buell, Landon [1 ]
Mark, Miguel [2 ]
Kinsy, Michel A. [2 ]
Xu, Dongpeng [1 ]
Yu, Qiaoyan [1 ]
机构
[1] Univ New Hampshire, Durham, NH 03824 USA
[2] Texas & Amp M Univ, College Stn, TX 77843 USA
基金
美国国家科学基金会;
关键词
Approximate computing; security threat; attack model; hardware Trojan; side-channel attack; covert channel; approximate arithmetic circuit; phase change memory; fault tolerance; error control; edge detection; artificial neural network; fast Fourier transform (FFT); finite impulse response (FIR) filter; DESIGN; POWER;
D O I
10.1145/3442380
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Approximate computing (AC) represents a paradigm shift from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy. The rapid progress on the development of diverse AC techniques allows us to apply approximate computing to many computation-intensive applications. However, the utilization of AC techniques could bring in new unique security threats to computing systems. This work does a survey on existing circuit-, architecture-, and compiler-level approximate mechanisms/algorithms, with special emphasis on potential security vulnerabilities. Qualitative and quantitative analyses are performed to assess the impact of the new security threats on AC systems. Moreover, this work proposes four unique visionary attack models, which systematically cover the attacks that build covert channels, compensate approximation errors, terminate normal error resilience mechanisms, and propagate additional errors. To thwart those attacks, this work further offers the guideline of countermeasure designs. Several case studies are provided to illustrate the implementation of the suggested countermeasures.
引用
收藏
页数:31
相关论文
共 6 条
  • [1] Approximate Reconfigurable Hardware Accelerator: Adapting the Micro-architecture to Dynamic Workloads
    Xu, Siyuan
    Schafer, Benjamin Carrion
    [J]. 2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 113 - 120
  • [2] A Micro-architecture that supports the Fano-Elias encoding and a hardware accelerator for approximate membership queries
    Even, Guy
    Domingues, Gabriel Marques
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2024, 105
  • [3] Hardware Attack and Assurance with Machine Learning: A Security Threat to Circuits and Systems
    Gwee, Bah-Hwee
    [J]. APCCAS 2020: PROCEEDINGS OF THE 2020 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2020), 2020, : 1 - 1
  • [4] An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
    Cetinkaya, Ahmet
    Ishii, Hideaki
    Hayakawa, Tomohisa
    [J]. ENTROPY, 2019, 21 (02)
  • [5] Computing on large-scale distributed systems:: XtremWeb architecture, programming models, security, tests and convergence with grid
    Cappello, F
    Djilali, S
    Fedak, G
    Herault, T
    Magniette, F
    Néri, V
    Lodygensky, O
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2005, 21 (03): : 417 - 437
  • [6] 3D finite element models from serial section histology of skeletal muscle tissue - The role of micro-architecture on mechanical behaviour
    Kuravi, R.
    Leichsenring, K.
    Boel, M.
    Ehret, A. E.
    [J]. JOURNAL OF THE MECHANICAL BEHAVIOR OF BIOMEDICAL MATERIALS, 2021, 113