Kartik Nayak, Devanshi Upadhyaya, F. Regazzoni, I. Polian
{"title":"On the Limitations of Logic Locking the Approximate Circuits","authors":"Kartik Nayak, Devanshi Upadhyaya, F. Regazzoni, I. Polian","doi":"10.1109/AsianHOST56390.2022.10022175","DOIUrl":null,"url":null,"abstract":"Approximate Computing (AxC) is an emerging architectural paradigm, which promises improvements in area, performance or power consumption at the expense of limited and tolerable inaccuracies of computations. Circuits designed in typical AxC-friendly applications, such as neural network accelerators, visual computing and high-bandwidth communication, are vulnerable to supply-chain attacks. In this paper, we investigate logic locking-a protective technique against counterfeiting and overbuilding-in the context of AxC arithmetic primitives. We discuss a threat model that can hinder the adoption of logic locking on AxC based ICs. We show that modern SAT-resilient locking techniques are unsuitable for approximate circuits because of the low output corruption problem. Moreover, we explore the resistance of logic locking against an attacker who managed to obtain a subset of the correct locking key's bits. We show that an incorrectly unlocked circuit can still produce acceptable results, experimentally verifying this both at the level of primitives (adders and multipliers) and in a full application (neural network inference with approximate multiply-accumulate units).","PeriodicalId":207435,"journal":{"name":"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsianHOST56390.2022.10022175","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Approximate Computing (AxC) is an emerging architectural paradigm, which promises improvements in area, performance or power consumption at the expense of limited and tolerable inaccuracies of computations. Circuits designed in typical AxC-friendly applications, such as neural network accelerators, visual computing and high-bandwidth communication, are vulnerable to supply-chain attacks. In this paper, we investigate logic locking-a protective technique against counterfeiting and overbuilding-in the context of AxC arithmetic primitives. We discuss a threat model that can hinder the adoption of logic locking on AxC based ICs. We show that modern SAT-resilient locking techniques are unsuitable for approximate circuits because of the low output corruption problem. Moreover, we explore the resistance of logic locking against an attacker who managed to obtain a subset of the correct locking key's bits. We show that an incorrectly unlocked circuit can still produce acceptable results, experimentally verifying this both at the level of primitives (adders and multipliers) and in a full application (neural network inference with approximate multiply-accumulate units).