首页> 外文会议>IEEE International Symposium on Circuits and Systems >Model Reverse-Engineering Attack using Correlation Power Analysis against Systolic Array Based Neural Network Accelerator
【24h】

Model Reverse-Engineering Attack using Correlation Power Analysis against Systolic Array Based Neural Network Accelerator

机译:基于相关阵分析的基于脉动阵列的神经网络加速器模型逆向工程攻击

获取原文

摘要

Various deep neural network (DNN) accelerators have been proposed for artificial intelligence (AI) inference on edge devices. On the other hand, hardware security issues of the DNN accelerator have not been discussed well. Trained DNN models are important intellectual property and a valuable target for adversaries. In particular, when a DNN model is implemented on an edge device, adversaries can physically access the device and try to reveal the implemented DNN model. Therefore, the DNN execution environment on an edge device requires countermeasures such as data encryption on off-chip memory against various reverse-engineering attacks. In this paper, we reveal DNN model parameters by utilizing correlation power analysis (CPA) against a systolic array circuit that is widely used in DNN accelerator hardware. Our experimental results show that the adversary can extract trained model parameters from a DNN accelerator even if the DNN model parameters are protected with data encryption. The results suggest that countermeasures against side-channel leaks are important for implementing a DNN accelerator on FPGA or ASIC.
机译:已经提出了各种深度神经网络(DNN)加速器,用于边缘设备上的人工智能(AI)推理。另一方面,DNN加速器的硬件安全性问题尚未得到很好的讨论。训练有素的DNN模型是重要的知识产权,也是对手的宝贵目标。特别是,当在边缘设备上实现DNN模型时,对手可以物理访问该设备并尝试揭示实现的DNN模型。因此,边缘设备上的DNN执行环境需要采取对策,例如针对各种反向工程攻击的片外存储器上的数据加密。在本文中,我们通过利用针对DNN加速器硬件中广泛使用的脉动阵列电路的相关功率分析(CPA)来揭示DNN模型参数。我们的实验结果表明,即使DNN模型参数受到数据加密保护,对手也可以从DNN加速器中提取经过训练的模型参数。结果表明,针对旁通道泄漏的对策对于在FPGA或ASIC上实现DNN加速器很重要。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号