DSE-Based Hardware Trojan Attack for Neural Network Accelerators on FPGAs

被引:0
|
作者
Guo, Chao [1 ]
Yanagisawa, Masao [1 ]
Shi, Youhua [1 ]
机构
[1] Waseda Univ, Fac Fundamental Sci & Engn, Dept Elect & Phys Syst, Tokyo 1698555, Japan
关键词
Hardware; Field programmable gate arrays; Accuracy; Computational modeling; Security; Trojan horses; Software; Kernel; Computer architecture; Degradation; Deep neural networks (DNNs); design space exploration (DSE); hardware Trojan (HT); multi-FPGA;
D O I
10.1109/TNNLS.2024.3482364
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the past few years, the emergence and development of design space exploration (DSE) have shortened the deployment cycle of deep neural networks (DNNs). As a result, with these open-sourced DSE, we can automatically compute the optimal configuration and generate the corresponding accelerator intellectual properties (IPs) from the pretrained neural network models and hardware constraints. However, to date, the security of DSE has received little attention. Therefore, we explore this issue from an adversarial perspective and propose an automated hardware Trojan (HT) generation framework embedded within DSE. The framework uses an evolutionary algorithm (EA) to analyze user-input data to automatically generate the attack code before placing it in the final output accelerator IPs. The proposed HT is sufficiently stealthy and suitable for both single and multifield-programmable gate array (FPGA) designs. It can also implement controlled accuracy degradation attacks and specified category attacks. We conducted experiments on LeNet, VGG-16, and YOLO, respectively, and found that for the LeNet model trained on the CIFAR-10 dataset, attacking only one kernel resulted in 97.3% of images being classified in the category specified by the adversary and reduced accuracy by 59.58%. Moreover, for the VGG-16 model trained on the ImageNet dataset, attacking eight kernels can cause up to 96.53% of the images to be classified into the category specified by the adversary and causes the model's accuracy to decrease to 2.5%. Finally, for the YOLO model trained on the PASCAL VOC dataset, attacking with eight kernels can cause the model to identify the target as the specified category and cause slight perturbations to the bounding boxes. Compared to the un-compromised designs, the look-up tables (LUTs) overhead of the proposed HT design does not exceed 0.6%.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] FPGA-QNN: Quantized Neural Network Hardware Acceleration on FPGAs
    Tasci, Mustafa
    Istanbullu, Ayhan
    Tumen, Vedat
    Kosunalp, Selahattin
    APPLIED SCIENCES-BASEL, 2025, 15 (02):
  • [42] FPGA based neural network accelerators
    Kim, Joo-Young
    HARDWARE ACCELERATOR SYSTEMS FOR ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING, 2021, 122 : 135 - 165
  • [43] Joint Protection Scheme for Deep Neural Network Hardware Accelerators and Models
    Zhou, Jingbo
    Zhang, Xinmiao
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (12) : 4518 - 4527
  • [44] Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators
    Isakov, Mihailo
    Bu, Lake
    Cheng, Hai
    Kinsy, Michel A.
    PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2018, : 62 - 67
  • [45] Hardware Accelerators for a Convolutional Neural Network in Condition Monitoring of CNC Machines
    Hoyer, Ingo
    Berg, Oscar
    Krupp, Lukas
    Utz, Alexander
    Wiede, Christian
    Seidl, Karsten
    2023 IEEE SENSORS, 2023,
  • [46] DSDPC: Delay Signatures at Different Process Corners based Hardware Trojan Detection Technique for FPGAs
    Sumathi, G.
    Srivani, L.
    Murthy, D. Thirugnana
    Murali, N.
    Murty, S. A. V. Satya
    Jayakumar, T.
    2015 INTERNATIONAL CONFERENCE ON ROBOTICS, AUTOMATION, CONTROL AND EMBEDDED SYSTEMS (RACE), 2015,
  • [47] Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs
    Boraten, Travis
    Kodi, Avinash
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 : 24 - 38
  • [48] A new hardware Trojan detection technique using deep convolutional neural network
    Sharma, Richa
    Rathor, Vijaypal Singh
    Sharma, G. K.
    Pattanaik, Manisha
    INTEGRATION-THE VLSI JOURNAL, 2021, 79 (79) : 1 - 11
  • [49] Computer Vision for Hardware Trojan Detection on a PCB Using Siamese Neural Network
    Piliposyan, Gor
    Khursheed, Saqib
    2022 IEEE PHYSICAL ASSURANCE AND INSPECTION OF ELECTRONICS (PAINE), 2022, : 15 - 21
  • [50] DSP-Efficient Hardware Acceleration of Convolutional Neural Network Inference on FPGAs
    Wang, Dong
    Xu, Ke
    Guo, Jingning
    Ghiasi, Soheil
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (12) : 4867 - 4880