4.2 Article

AccHashtag: Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3555808

关键词

Deep learning; fault-injection; bit-flip attack; hashing; embedded systems

向作者/读者索取更多资源

AccHashtag is the first framework for high-accuracy detection of fault-injection attacks on DNNs with provable bounds on detection performance. It extracts a unique signature from the benign DNN prior to deployment to validate the model's integrity and verify the inference output on the fly. AccHashtag identifies the most vulnerable DNN layers to the fault-injection attack using a novel sensitivity analysis.
We propose AccHashtag, the first framework for high-accuracy detection of fault-injection attacks on Deep Neural Networks (DNNs) with provable bounds on detection performance. Recent literature in fault-injection attacks shows the severeDNNaccuracy degradation caused by bit flips. In this scenario, the attacker changes a fewDNNweight bits during execution by injecting faults to the dynamic random-access memory (DRAM). To detect bit flips, AccHashtag extracts a unique signature from the benign DNN prior to deployment. The signature is used to validate the model's integrity and verify the inference output on the fly. We propose a novel sensitivity analysis that identifies the most vulnerable DNN layers to the fault-injection attack. The DNN signature is constructed by encoding theweights in vulnerable layers using a low-collision hash function. During DNN inference, new hashes are extracted from the target layers and compared against the ground-truth signatures. AccHashtag incorporates a lightweight methodology that allows for real-time fault detection on embedded platforms. We devise a specialized compute core for AccHashtag on field-programmable gate arrays (FPGAs) to facilitate online hash generation in parallel to DNN execution. Extensive evaluations with the state-of-the-art bit-flip attack on various DNNs demonstrate the competitive advantage of AccHashtag in terms of both attack detection and execution overhead.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据