Blurring Boundaries: A New Way to Secure Approximate Computing Systems

Approximate computing (AC) techniques have been widely used to improve the performance of computing systems by trading off accuracy. However, recent literature projects that the utilization of approximation could bring in new security threats to computing systems. This work presents two practical attacks on the AC systems for multilayer perceptron (MLP) and Sobel algorithm based image edge detection. The case studies in this work indicate that the approximation mechanism in AC systems can be exploited to conduct stealthy attacks, which suddenly cause significant degradation in accuracy and lead to unpredictable primary outputs. To address the emerging threats on AC systems, this work proposes to blur the boundary between approximate and precise computing submodules in AC systems. This new defense method obscures that boundary with three obfuscation schemes such that adversary could not easily identify the right target to precisely perform hardware tampering attacks. Simulation results show that the proposed method can effectively reduce the attack success rate.

[1]  Qiang Xu,et al.  ApproxANN: An approximate computing framework for artificial neural network , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[2]  Qiaoyan Yu,et al.  Can We Securely Use Approximate Computing? , 2020, ISCAS.

[3]  Luca Benini,et al.  Spatial Memoization: Concurrent Instruction Reuse to Correct Timing Errors in SIMD Architectures , 2013, IEEE Transactions on Circuits and Systems II: Express Briefs.

[4]  Jie Han Introduction to approximate computing , 2016, 2016 IEEE 34th VLSI Test Symposium (VTS).

[5]  Kaushik Roy,et al.  AxNN: Energy-efficient neuromorphic systems using approximate computing , 2014, 2014 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED).

[6]  Michel A. Kinsy,et al.  Security Threats in Approximate Computing Systems , 2019, ACM Great Lakes Symposium on VLSI.

[7]  Qiang Xu,et al.  ApproxMA: Approximate Memory Access for Dynamic Precision Scaling , 2015, ACM Great Lakes Symposium on VLSI.

[8]  Shahrzad Keshavarz,et al.  Privacy leakages in approximate adders , 2017, 2017 IEEE International Symposium on Circuits and Systems (ISCAS).

[9]  Sparsh Mittal,et al.  A Survey of Techniques for Approximate Computing , 2016, ACM Comput. Surv..

[10]  Gang Wang,et al.  Enhanced low-power high-speed adder for error-tolerant application , 2009, 2010 International SoC Design Conference.

[11]  Qiaoyan Yu,et al.  Security Threats and Countermeasures for Approximate Arithmetic Computing , 2020, 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC).

[12]  Antonio G. M. Strollo,et al.  Approximate computing in the nanoscale era , 2018, 2018 International Conference on IC Design & Technology (ICICDT).

[13]  Scott A. Mahlke,et al.  Quality Control for Approximate Accelerators by Error Prediction , 2016, IEEE Design & Test.

[14]  Norbert Wehn,et al.  Invited: Approximate computing with partially unreliable dynamic random access memory — Approximate DRAM , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[15]  Cesare Alippi,et al.  Security: The Dark Side of Approximate Computing? , 2018, 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[16]  Boris Murmann,et al.  SRAM voltage scaling for energy-efficient convolutional neural networks , 2017, 2017 18th International Symposium on Quality Electronic Design (ISQED).

[17]  Woongki Baek,et al.  Green: a framework for supporting energy-conscious programming using controlled approximation , 2010, PLDI '10.

[18]  O. R. Vincent,et al.  A Descriptive Algorithm for Sobel Image Edge Detection , 2009 .

[19]  Kaushik Roy,et al.  Low-Power Digital Signal Processing Using Approximate Adders , 2013, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[20]  Qiang Xu,et al.  Approximate Computing: A Survey , 2016, IEEE Design & Test.

[21]  CezeLuis,et al.  Architecture support for disciplined approximate programming , 2012 .