Security Threats and Countermeasures for Approximate Arithmetic Computing

Pruthvy Yellu, M. Monjur, Timothy Kammerer, Dongpeng Xu, Qiaoyan Yu
{"title":"Security Threats and Countermeasures for Approximate Arithmetic Computing","authors":"Pruthvy Yellu, M. Monjur, Timothy Kammerer, Dongpeng Xu, Qiaoyan Yu","doi":"10.1109/ASP-DAC47756.2020.9045385","DOIUrl":null,"url":null,"abstract":"Approximate computing (AC) emerges as a promising approach for energy-accuracy trade-off in compute-intensive applications. However, recent work reveals that AC techniques could lead to new security vulnerabilities, which are presented in a format of visionary view. There is a lack of in-depth research on concrete attack models and estimation of the significance of the attacks on approximate arithmetic computing systems. This work presents several practical attack examples and then proposes two attack models with quantitative analysis. Input integrity check and exclusive logic based attack detection methods are proposed to address the attacks on AC systems. The experimental results show that the attack detection failure rate of our method is below $2.2*10^{-3}$ and the area and power overhead is less than 6.8% and 1.5%, respectively.","PeriodicalId":125112,"journal":{"name":"2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASP-DAC47756.2020.9045385","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Approximate computing (AC) emerges as a promising approach for energy-accuracy trade-off in compute-intensive applications. However, recent work reveals that AC techniques could lead to new security vulnerabilities, which are presented in a format of visionary view. There is a lack of in-depth research on concrete attack models and estimation of the significance of the attacks on approximate arithmetic computing systems. This work presents several practical attack examples and then proposes two attack models with quantitative analysis. Input integrity check and exclusive logic based attack detection methods are proposed to address the attacks on AC systems. The experimental results show that the attack detection failure rate of our method is below $2.2*10^{-3}$ and the area and power overhead is less than 6.8% and 1.5%, respectively.
近似算术计算的安全威胁与对策
在计算密集型应用中,近似计算(AC)是一种很有前途的能量-精度权衡方法。然而,最近的研究表明,AC技术可能导致新的安全漏洞,这些漏洞以一种有远见的观点的形式呈现。对于具体的攻击模型和攻击对近似算术计算系统的意义估计缺乏深入的研究。本文给出了几个实际的攻击实例,并通过定量分析提出了两种攻击模型。针对针对交流系统的攻击,提出了输入完整性检查和基于排他逻辑的攻击检测方法。实验结果表明,该方法的攻击检测失败率低于$2.2*10^{-3}$,面积和功耗开销分别小于6.8%和1.5%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信