首页 > 最新文献

2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)最新文献

英文 中文
Effective fault simulation of GPU’s permanent faults for reliability estimation of CNNs 对GPU永久故障进行有效的故障仿真,用于cnn的可靠性估计
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897823
Juan-David Guerrero-Balaguera, Robert Limas Sierra, M. Reorda
Convolutional Neural Networks (CNNs) and Graphic Processing Units (GPUs) are now increasingly adopted in many cutting edge safety-critical applications. Consequently, it is crucial to evaluate the reliability of these systems, since the hardware can be affected by several phenomena (e.g., wear out of the device), producing permanent defects in the GPU. These defects may induce wrong outcomes in the CNN that may endanger the application. Traditionally, the study of the effects of permanent faults on CNNs has been approached by resorting to application-level fault injection (e.g., acting on the weights). However, this approach has restricted scope, and it may not reveal the actual vulnerabilities in the GPU device. Hence, a more accurate evaluation of the fault effects is required, considering more in-depth details of the device’s hardware. This work introduces a more elaborated experimental evaluation of the impact of GPU’s permanent faults on the reliability of a CNN by resorting to a Software-Implemented Fault Injection(SWIFI) strategy, considering faults at the hardware level. The results of the fault simulation campaigns we performed on the GPU data-path cores are compared with those at the application level, proving that the latter ones are generally optimistic.
卷积神经网络(cnn)和图形处理单元(gpu)现在越来越多地应用于许多尖端的安全关键应用。因此,评估这些系统的可靠性至关重要,因为硬件可能受到几种现象的影响(例如,设备磨损),从而在GPU中产生永久性缺陷。这些缺陷可能会导致CNN出现错误的结果,从而危及应用。传统上,永久性故障对cnn影响的研究是通过应用级故障注入(例如,作用于权重)来进行的。然而,这种方法的范围有限,它可能无法揭示GPU设备中的实际漏洞。因此,需要更准确地评估故障影响,同时考虑到设备硬件更深入的细节。这项工作引入了一个更详细的实验评估,通过采用软件实现故障注入(SWIFI)策略,考虑硬件层面的故障,GPU的永久故障对CNN可靠性的影响。我们在GPU数据路径核心上进行的故障模拟活动的结果与应用层的结果进行了比较,证明后者总体上是乐观的。
{"title":"Effective fault simulation of GPU’s permanent faults for reliability estimation of CNNs","authors":"Juan-David Guerrero-Balaguera, Robert Limas Sierra, M. Reorda","doi":"10.1109/IOLTS56730.2022.9897823","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897823","url":null,"abstract":"Convolutional Neural Networks (CNNs) and Graphic Processing Units (GPUs) are now increasingly adopted in many cutting edge safety-critical applications. Consequently, it is crucial to evaluate the reliability of these systems, since the hardware can be affected by several phenomena (e.g., wear out of the device), producing permanent defects in the GPU. These defects may induce wrong outcomes in the CNN that may endanger the application. Traditionally, the study of the effects of permanent faults on CNNs has been approached by resorting to application-level fault injection (e.g., acting on the weights). However, this approach has restricted scope, and it may not reveal the actual vulnerabilities in the GPU device. Hence, a more accurate evaluation of the fault effects is required, considering more in-depth details of the device’s hardware. This work introduces a more elaborated experimental evaluation of the impact of GPU’s permanent faults on the reliability of a CNN by resorting to a Software-Implemented Fault Injection(SWIFI) strategy, considering faults at the hardware level. The results of the fault simulation campaigns we performed on the GPU data-path cores are compared with those at the application level, proving that the latter ones are generally optimistic.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133558553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SENAS: Security driven ENergy Aware Scheduler for Real Time Approximate Computing Tasks on Multi-Processor Systems SENAS:多处理器系统上实时近似计算任务的安全驱动的能量感知调度器
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897811
Krishnendu Guha, S. Saha, K. Mcdonald-Maier
Present day real time approximate computing applications like image and video processing involves execution of a set of tasks before a certain amount of time or deadline. In addition to this, present day systems are associated with strict energy budget that cannot be changed post deployment. The tasks comprises of a mandatory and optional part. Completion of all mandatory portions of all tasks before deadline is much more important than result accuracy in such real time approximate computing applications. Based on the energy budget, the optional portions can be executed that determines the quality of service (QoS) of the system. In ideal scenario, sufficient energy budget is present that ensures completion of both mandatory and optional portions in a system with a pre-determined number of processors. However, if fault or malware attack occurs on one or more processors, then the system will cease to work and results may be fatal. In this work, we consider such a scenario where the processors may be faulty and stop functioning in post deployment phases or some malware may cause unexpected delays in processing or may cause unexpected power draining at runtime that will prevent the system from meeting its deadline. We propose a Security driven ENergy Aware Scheduler (SENAS) that works as a self aware agent. Initially, based on the available energy budget, SENAS determines which task is to be executed in which processor of a system. At runtime, SENAS constantly monitors the working of the processors and on detecting any anomaly in any of the processors, it reschedules its tasks at runtime by reducing execution of the optional portions of the tasks and ensuring completion before deadline with high QoS.
现在的实时近似计算应用程序,如图像和视频处理,涉及在一定时间或截止日期之前执行一组任务。除此之外,目前的系统有严格的能源预算,部署后不能改变。任务分为必选和可选两部分。在这种实时近似计算应用中,在截止日期之前完成所有任务的所有强制部分比结果准确性重要得多。可以根据能量预算执行可选部分,决定系统的QoS (quality of service)。在理想情况下,存在足够的能量预算,以确保在预先确定数量的处理器的系统中完成强制和可选部分。但是,如果在一个或多个处理器上发生故障或恶意软件攻击,则系统将停止工作,结果可能是致命的。在这项工作中,我们考虑这样一种场景:处理器可能出现故障,并在部署后阶段停止工作,或者一些恶意软件可能导致处理中的意外延迟,或者可能在运行时导致意外的功耗,从而阻止系统满足其截止日期。我们提出了一个安全驱动的能量感知调度程序(SENAS),它作为一个自我感知代理工作。最初,基于可用的能量预算,SENAS决定在系统的哪个处理器中执行哪个任务。在运行时,SENAS不断地监视处理器的工作,并且在检测到任何处理器中的任何异常时,它通过减少任务的可选部分的执行并确保在截止日期之前以高QoS完成其任务,从而在运行时重新安排任务。
{"title":"SENAS: Security driven ENergy Aware Scheduler for Real Time Approximate Computing Tasks on Multi-Processor Systems","authors":"Krishnendu Guha, S. Saha, K. Mcdonald-Maier","doi":"10.1109/IOLTS56730.2022.9897811","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897811","url":null,"abstract":"Present day real time approximate computing applications like image and video processing involves execution of a set of tasks before a certain amount of time or deadline. In addition to this, present day systems are associated with strict energy budget that cannot be changed post deployment. The tasks comprises of a mandatory and optional part. Completion of all mandatory portions of all tasks before deadline is much more important than result accuracy in such real time approximate computing applications. Based on the energy budget, the optional portions can be executed that determines the quality of service (QoS) of the system. In ideal scenario, sufficient energy budget is present that ensures completion of both mandatory and optional portions in a system with a pre-determined number of processors. However, if fault or malware attack occurs on one or more processors, then the system will cease to work and results may be fatal. In this work, we consider such a scenario where the processors may be faulty and stop functioning in post deployment phases or some malware may cause unexpected delays in processing or may cause unexpected power draining at runtime that will prevent the system from meeting its deadline. We propose a Security driven ENergy Aware Scheduler (SENAS) that works as a self aware agent. Initially, based on the available energy budget, SENAS determines which task is to be executed in which processor of a system. At runtime, SENAS constantly monitors the working of the processors and on detecting any anomaly in any of the processors, it reschedules its tasks at runtime by reducing execution of the optional portions of the tasks and ensuring completion before deadline with high QoS.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123506313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovering Information on the CVA6 RISC-V CPU with a Baremetal Micro-Architectural Covert Channel 基于裸金属微架构隐蔽通道的CVA6 RISC-V CPU信息恢复
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897297
Valentin Martinoli, Y. Teglia, Abdellah Bouagoun, R. Leveugle
In this work, we study the micro architectural vulnerabilities of the open-source RISC-V CPU named CVA6. We build a realistic scenario for extracting information and propose an analysis on how to reduce the impact of noise on the attack, while staying as close as possible to hardware level through baremetal simulations.
本文主要研究开源RISC-V CPU CVA6的微架构漏洞。我们构建了一个真实的信息提取场景,并提出了如何减少噪声对攻击的影响的分析,同时通过裸机模拟尽可能接近硬件水平。
{"title":"Recovering Information on the CVA6 RISC-V CPU with a Baremetal Micro-Architectural Covert Channel","authors":"Valentin Martinoli, Y. Teglia, Abdellah Bouagoun, R. Leveugle","doi":"10.1109/IOLTS56730.2022.9897297","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897297","url":null,"abstract":"In this work, we study the micro architectural vulnerabilities of the open-source RISC-V CPU named CVA6. We build a realistic scenario for extracting information and propose an analysis on how to reduce the impact of noise on the attack, while staying as close as possible to hardware level through baremetal simulations.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122773206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Soft Error Resilient Deep Learning Systems Using Neuron Gradient Statistics 基于神经元梯度统计的软误差弹性深度学习系统
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897815
C. Amarnath, Mohamed Mejri, Kwondo Ma, A. Chatterjee
Deep learning techniques have been widely adopted in daily life with applications ranging from face recognition to recommender systems. The substantial overhead of conventional error tolerance techniques precludes their widespread use, while approaches involving median filtering and invariant generation rely on alterations to DNN training that may be difficult to achieve for larger networks on larger datasets. To address this issue, this paper presents a novel approach taking advantage of the statistics of neuron output gradients to identify and suppress erroneous neuron values. By using the statistics of neurons’ gradients with respect to their neighbors, tighter statistical thresholds are obtained compared to the use of neuron output values alone. This approach is modular and is combined with accurate, low-overhead error detection methods to ensure it is used only when needed, further reducing its cost. Deep learning models can be trained using standard methods and our error correction module is fit to a trained DNN, achieving comparable or superior performance compared to baseline error correction methods while incurring comparable hardware overhead without needing to modify DNN training or utilize specialized hardware architectures.
深度学习技术已经广泛应用于日常生活中,从人脸识别到推荐系统。传统容错技术的巨大开销阻碍了它们的广泛使用,而涉及中值过滤和不变生成的方法依赖于对DNN训练的改变,这可能难以在更大的数据集上实现更大的网络。为了解决这个问题,本文提出了一种利用神经元输出梯度统计来识别和抑制错误神经元值的新方法。与单独使用神经元输出值相比,通过使用神经元相对于其邻居的梯度统计,可以获得更严格的统计阈值。这种方法是模块化的,并与精确、低开销的错误检测方法相结合,以确保仅在需要时使用,从而进一步降低成本。深度学习模型可以使用标准方法进行训练,我们的纠错模块适合训练好的深度神经网络,与基线纠错方法相比,实现相当或更好的性能,同时产生相当的硬件开销,而无需修改深度神经网络训练或利用专门的硬件架构。
{"title":"Soft Error Resilient Deep Learning Systems Using Neuron Gradient Statistics","authors":"C. Amarnath, Mohamed Mejri, Kwondo Ma, A. Chatterjee","doi":"10.1109/IOLTS56730.2022.9897815","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897815","url":null,"abstract":"Deep learning techniques have been widely adopted in daily life with applications ranging from face recognition to recommender systems. The substantial overhead of conventional error tolerance techniques precludes their widespread use, while approaches involving median filtering and invariant generation rely on alterations to DNN training that may be difficult to achieve for larger networks on larger datasets. To address this issue, this paper presents a novel approach taking advantage of the statistics of neuron output gradients to identify and suppress erroneous neuron values. By using the statistics of neurons’ gradients with respect to their neighbors, tighter statistical thresholds are obtained compared to the use of neuron output values alone. This approach is modular and is combined with accurate, low-overhead error detection methods to ensure it is used only when needed, further reducing its cost. Deep learning models can be trained using standard methods and our error correction module is fit to a trained DNN, achieving comparable or superior performance compared to baseline error correction methods while incurring comparable hardware overhead without needing to modify DNN training or utilize specialized hardware architectures.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124733778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Structural Test Generation for AI Accelerators using Neural Twins 基于神经双胞胎的人工智能加速器结构测试生成
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897773
Arjun Chaudhuri, Sanmitra Banerjee, K. Chakrabarty
We present a neural twin-based structural test pattern generation method for stuck-at faults in systolic array-based AI inferencing accelerators. The neural twin is a neural representation of the gate-level netlist of a processing element and it provides a one-to-one topological correspondence with the PE netlist. We leverage neural twin-enabled backpropagation for gradient computation to determine an input pattern that sensitizes a fault in the netlist. Our framework also supports pattern compaction for a batch of faults. Consequently, GPU-accelerated test-pattern generation is achieved with the proposed framework that can potentially detect hard-to-detect and random-pattern-resistant faults in AI accelerators. Experimental results for 4-bit, 8-bit, and 16-bit fixed-point accelerator arrays show the effectiveness of the proposed method.
针对基于收缩阵列的人工智能推理加速器中卡在故障,提出了一种基于神经孪生的结构测试模式生成方法。神经孪生是处理单元的门级网表的神经表示,它与PE网表提供一对一的拓扑对应关系。我们利用神经孪生反向传播进行梯度计算,以确定对网络列表中的故障敏感的输入模式。我们的框架还支持对一批错误进行模式压缩。因此,使用所提出的框架可以实现gpu加速的测试模式生成,该框架可以潜在地检测人工智能加速器中难以检测和抗随机模式的故障。对4位、8位和16位定点加速器阵列的实验结果表明了该方法的有效性。
{"title":"Structural Test Generation for AI Accelerators using Neural Twins","authors":"Arjun Chaudhuri, Sanmitra Banerjee, K. Chakrabarty","doi":"10.1109/IOLTS56730.2022.9897773","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897773","url":null,"abstract":"We present a neural twin-based structural test pattern generation method for stuck-at faults in systolic array-based AI inferencing accelerators. The neural twin is a neural representation of the gate-level netlist of a processing element and it provides a one-to-one topological correspondence with the PE netlist. We leverage neural twin-enabled backpropagation for gradient computation to determine an input pattern that sensitizes a fault in the netlist. Our framework also supports pattern compaction for a batch of faults. Consequently, GPU-accelerated test-pattern generation is achieved with the proposed framework that can potentially detect hard-to-detect and random-pattern-resistant faults in AI accelerators. Experimental results for 4-bit, 8-bit, and 16-bit fixed-point accelerator arrays show the effectiveness of the proposed method.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114455903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
All Digital Low-Cost Built-in Defect Testing Strategy for Operational Amplifiers with High Coverage 高覆盖运算放大器全数字低成本内置缺陷测试策略
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897224
Michael Sekyere, M. Saikiran, Degang Chen
Backed by standards like ISO26262, achieving near 100% defect coverage is becoming a common reliability requirement in the ever-growing automotive industry. However, achieving high defect coverage in an analog circuit has been proven to be a difficult/expensive task even with sophisticated analog and digital testing circuitry. In this work, we present a simple design for testability (DfT) technique that achieves 98% defect coverage for operational amplifiers including Widlar current reference and biasing circuitry. Our robust testing method utilizes purely digital testing circuits and is extremely time-efficient reducing the test cost. The proposed method can be used both at production test and for on-line health monitoring post-deployment to detect zero-time and latent defects. Also, the digital nature of our method presents a way for defect localization through the recorded bit streams. In this work, we also introduce a simple method to detect defects in the Widlar current reference and the bias current circuit. We validate all our results using extensive transistor-level simulations in UMC65nm technology.
在ISO26262等标准的支持下,在不断发展的汽车行业中,实现接近100%的缺陷覆盖率正在成为一种常见的可靠性要求。然而,即使使用复杂的模拟和数字测试电路,在模拟电路中实现高缺陷覆盖率已被证明是一项困难/昂贵的任务。在这项工作中,我们提出了一种简单的可测试性(DfT)技术设计,该技术可为包括Widlar电流基准和偏置电路在内的运算放大器实现98%的缺陷覆盖率。我们强大的测试方法利用纯数字测试电路,非常省时,降低了测试成本。该方法既可用于生产测试,也可用于部署后的在线健康监测,以检测零时间缺陷和潜在缺陷。此外,该方法的数字特性提供了一种通过记录的比特流进行缺陷定位的方法。在本工作中,我们还介绍了一种检测威德勒基准电流和偏置电流电路缺陷的简单方法。我们在UMC65nm技术中使用广泛的晶体管级模拟验证了所有结果。
{"title":"All Digital Low-Cost Built-in Defect Testing Strategy for Operational Amplifiers with High Coverage","authors":"Michael Sekyere, M. Saikiran, Degang Chen","doi":"10.1109/IOLTS56730.2022.9897224","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897224","url":null,"abstract":"Backed by standards like ISO26262, achieving near 100% defect coverage is becoming a common reliability requirement in the ever-growing automotive industry. However, achieving high defect coverage in an analog circuit has been proven to be a difficult/expensive task even with sophisticated analog and digital testing circuitry. In this work, we present a simple design for testability (DfT) technique that achieves 98% defect coverage for operational amplifiers including Widlar current reference and biasing circuitry. Our robust testing method utilizes purely digital testing circuits and is extremely time-efficient reducing the test cost. The proposed method can be used both at production test and for on-line health monitoring post-deployment to detect zero-time and latent defects. Also, the digital nature of our method presents a way for defect localization through the recorded bit streams. In this work, we also introduce a simple method to detect defects in the Widlar current reference and the bias current circuit. We validate all our results using extensive transistor-level simulations in UMC65nm technology.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"59 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115209990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists 针对门级网表对抗性攻击的有效硬件木马特征提取
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897557
Kazuki Yamashita, Tomohiro Kato, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, N. Togawa
Recently, with the increase in outsourcing of IC design and manufacturing, the possibility of inserting hardware Trojans, which are circuits with malicious functions, has been pointed out. To prevent this threat, a method to identify hardware Trojans using neural networks has been proposed. On the other hand, adversarial attacks have emerged that modify circuit design information to reduce the accuracy of hardware-Trojan classification by neural networks. Since the features designed by existing methods do not take the attacks into account, it is necessary to consider a new method for countermeasures. In this paper, out of 76 features that are strongly related to hardware-Trojan features, we investigate them from the viewpoint of the robustness against the adversarial attacks on circuit design information and newly propose 24 hardware-Trojan features. We compare the classifiers using the proposed 24 features with the classifiers using 11, 36, 51, and 76 existing features, respectively and confirm that the proposed ones are more robust in identifying hardware Trojans in circuits subjected to the adversarial attacks.
最近,随着IC设计和制造外包的增加,被指出有可能植入具有恶意功能的电路——硬件木马。为了防止这种威胁,提出了一种利用神经网络识别硬件木马的方法。另一方面,通过修改电路设计信息来降低神经网络对硬件木马分类的准确性的对抗性攻击已经出现。由于现有方法设计的特征没有考虑到攻击,因此有必要考虑新的对策方法。本文从对电路设计信息对抗性攻击的鲁棒性角度对76个与硬件木马特征密切相关的特征进行了研究,提出了24个硬件木马特征。我们将使用所提出的24个特征的分类器与使用11、36、51和76个现有特征的分类器进行了比较,并确认所提出的分类器在识别遭受对抗性攻击的电路中的硬件木马方面更加稳健。
{"title":"Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists","authors":"Kazuki Yamashita, Tomohiro Kato, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, N. Togawa","doi":"10.1109/IOLTS56730.2022.9897557","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897557","url":null,"abstract":"Recently, with the increase in outsourcing of IC design and manufacturing, the possibility of inserting hardware Trojans, which are circuits with malicious functions, has been pointed out. To prevent this threat, a method to identify hardware Trojans using neural networks has been proposed. On the other hand, adversarial attacks have emerged that modify circuit design information to reduce the accuracy of hardware-Trojan classification by neural networks. Since the features designed by existing methods do not take the attacks into account, it is necessary to consider a new method for countermeasures. In this paper, out of 76 features that are strongly related to hardware-Trojan features, we investigate them from the viewpoint of the robustness against the adversarial attacks on circuit design information and newly propose 24 hardware-Trojan features. We compare the classifiers using the proposed 24 features with the classifiers using 11, 36, 51, and 76 existing features, respectively and confirm that the proposed ones are more robust in identifying hardware Trojans in circuits subjected to the adversarial attacks.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130217910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the Impact of Cutting in Quantum Circuits Reliability to Transient Faults 理解量子电路中切割对瞬态故障可靠性的影响
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897308
Nadir Casciola, Edoardo Giusto, Emanuel A. Dri, Daniel Oliveira, P. Rech, B. Montrucchio
Quantum Computing is a highly promising new computation paradigm. Unfortunately, quantum bits (qubits) are extremely fragile and their state can be gradually or suddenly modified by intrinsic noise or external perturbation. In this paper, we target the sensitivity of quantum circuits to radiation-induced transient faults. We consider quantum circuit cuts that split the circuit into smaller independent portions, and understand how faults propagate in each portion. As we show, the cuts have different vulnerabilities, and our methodology successfully identifies the circuit portion that is more likely to contribute to the overall circuit error rate. Our evaluation shows that a circuit cut can have a 4.6 x higher probability than the other cuts, when corrupted, to modify the circuit output. Our study, identifying the most critical cuts, moves towards the possibility of implementing a selective hardening for quantum circuits.
量子计算是一种非常有前途的新型计算范式。不幸的是,量子比特(量子位)非常脆弱,它们的状态可以被内在噪声或外部扰动逐渐或突然地改变。在本文中,我们的目标是量子电路对辐射引起的瞬态故障的灵敏度。我们考虑将电路分割成更小的独立部分的量子电路切割,并了解故障如何在每个部分传播。正如我们所展示的,切割有不同的漏洞,我们的方法成功地识别了更有可能导致整体电路错误率的电路部分。我们的评估表明,当电路损坏时,电路切割可以有比其他切割高4.6倍的概率来修改电路输出。我们的研究确定了最关键的切割,朝着实现量子电路选择性硬化的可能性迈进。
{"title":"Understanding the Impact of Cutting in Quantum Circuits Reliability to Transient Faults","authors":"Nadir Casciola, Edoardo Giusto, Emanuel A. Dri, Daniel Oliveira, P. Rech, B. Montrucchio","doi":"10.1109/IOLTS56730.2022.9897308","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897308","url":null,"abstract":"Quantum Computing is a highly promising new computation paradigm. Unfortunately, quantum bits (qubits) are extremely fragile and their state can be gradually or suddenly modified by intrinsic noise or external perturbation. In this paper, we target the sensitivity of quantum circuits to radiation-induced transient faults. We consider quantum circuit cuts that split the circuit into smaller independent portions, and understand how faults propagate in each portion. As we show, the cuts have different vulnerabilities, and our methodology successfully identifies the circuit portion that is more likely to contribute to the overall circuit error rate. Our evaluation shows that a circuit cut can have a 4.6 x higher probability than the other cuts, when corrupted, to modify the circuit output. Our study, identifying the most critical cuts, moves towards the possibility of implementing a selective hardening for quantum circuits.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122630742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks 深入研究对深度神经网络的比特翻转攻击
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897693
Kevin Hector, Mathieu Dumont, Pierre-Alain Moëllic, J. Dutertre
Deep neural network models are massively deployed on a wide variety of hardware platforms. This results in the appearance of new attack vectors that significantly extend the standard attack surface, extensively studied by the adversarial machine learning community. One of the first attack that aims at drastically dropping the performance of a model by targeting its parameters stored in memory, is the Bit-Flip Attack (BFA). In this work, we point out several evaluation challenges related to the BFA. First, the lack of an adversary’s budget in the standard threat model is problematic, especially when dealing with physical attacks. Moreover, since the BFA presents critical variability, we discuss the influence of some training parameters and the importance of the model architecture. This work is the first to present the impact of the BFA against fully-connected architectures that present different behaviors compared to convolutional neural networks. These results highlight the importance of defining robust and sound evaluation methodologies to properly evaluate the dangers of parameter-based attacks as well as measure the real level of robustness offered by a defense.
深度神经网络模型被大量部署在各种各样的硬件平台上。这导致了新的攻击向量的出现,大大扩展了标准攻击面,被对抗性机器学习社区广泛研究。比特翻转攻击(bitcoin - flip attack, BFA)是一种旨在通过攻击存储在内存中的参数来大幅降低模型性能的攻击。在这项工作中,我们指出了与BFA相关的几个评估挑战。首先,在标准威胁模型中缺乏对手的预算是有问题的,特别是在处理物理攻击时。此外,由于BFA具有临界变异性,我们讨论了一些训练参数的影响以及模型体系结构的重要性。这项工作首次展示了BFA对与卷积神经网络相比表现出不同行为的全连接架构的影响。这些结果强调了定义健壮和可靠的评估方法的重要性,以便正确评估基于参数的攻击的危险,以及度量防御提供的健壮性的实际水平。
{"title":"A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks","authors":"Kevin Hector, Mathieu Dumont, Pierre-Alain Moëllic, J. Dutertre","doi":"10.1109/IOLTS56730.2022.9897693","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897693","url":null,"abstract":"Deep neural network models are massively deployed on a wide variety of hardware platforms. This results in the appearance of new attack vectors that significantly extend the standard attack surface, extensively studied by the adversarial machine learning community. One of the first attack that aims at drastically dropping the performance of a model by targeting its parameters stored in memory, is the Bit-Flip Attack (BFA). In this work, we point out several evaluation challenges related to the BFA. First, the lack of an adversary’s budget in the standard threat model is problematic, especially when dealing with physical attacks. Moreover, since the BFA presents critical variability, we discuss the influence of some training parameters and the importance of the model architecture. This work is the first to present the impact of the BFA against fully-connected architectures that present different behaviors compared to convolutional neural networks. These results highlight the importance of defining robust and sound evaluation methodologies to properly evaluate the dangers of parameter-based attacks as well as measure the real level of robustness offered by a defense.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132460035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IOLTS 2022 Foreword
Pub Date : 2022-09-12 DOI: 10.1109/iolts56730.2022.9897687
{"title":"IOLTS 2022 Foreword","authors":"","doi":"10.1109/iolts56730.2022.9897687","DOIUrl":"https://doi.org/10.1109/iolts56730.2022.9897687","url":null,"abstract":"","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130507409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1