Hardware Trojan attack method for on-chip interconnection structure of reconfigurable accelerator

An interconnection structure, hardware Trojan technology, applied in the protection of instruments, digital computer parts, internal/peripheral computer components, etc., can solve problems such as Trojan horse attack accelerator, affect artificial intelligence processing system, etc., achieve good concealment, reduce network reasoning The effect of precision, low hardware resource overhead

Pending Publication Date: 2021-03-02
XI AN JIAOTONG UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, implementing a hardware Trojan horse attack on the on-chip interconnect structure of a neural network accelerator will cause serious consequences to the accelerator, thus affecting the entire artificial intelligence processing system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Trojan attack method for on-chip interconnection structure of reconfigurable accelerator
  • Hardware Trojan attack method for on-chip interconnection structure of reconfigurable accelerator
  • Hardware Trojan attack method for on-chip interconnection structure of reconfigurable accelerator

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0088] In the reconfigurable convolutional neural network accelerator that has been designed, its on-chip interconnect structure is as follows: figure 1 As shown, the convolution operation of three convolution kernel sizes of 3×3, 5×5, and 11×11 can be realized by configuring the word organization operation array in Table 1. By modifying the RTL-level Verilog code, a hardware Trojan horse is implanted in the on-chip interconnection structure, and then two trigger conditions are preset respectively, and two kinds of trigger input hardware Trojan horse attacks are implemented.

[0089] Take the operation array to perform the 3×3 convolution kernel size operation and select the operation array and some structures of the Internet as an example, such as Figure 8 As shown in , it illustrates the hardware Trojan horse attack situation of image data triggering input. Figure 8 It is shown that the hardware trojan in the reconfigurable interconnection network modifies the control sel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware Trojan attack method for an on-chip interconnection structure of a reconfigurable accelerator, and the method comprises the following steps: 1) enabling a hardware Trojan triggering module to generate a triggering signal through employing configuration information or 20-bit image data as triggering input; comparing the configuration information or the image datawith a trigger condition predefined by an attacker to determine whether the trigger signal is valid or not; 2) when the trigger signal is valid, enabling the hardware Trojan load module to modify a control selection signal of a selector in the on-chip interconnection structure; and 3) controlling a selection signal to be modified, and changing an original data path and an operation circuit structure in the on-chip interconnection structure to cause wrong reasoning calculation. According to the hardware Trojan attack method for the reconfigurable accelerator on-chip interconnection structure provided by the invention, the reconfigurable on-chip interconnection structure is attacked, and an original data path and an operation circuit structure in the on-chip interconnection structure are changed, so that the classification precision of the neural network accelerator is reduced.

Description

technical field [0001] The invention belongs to the field of hardware security, and in particular relates to a hardware Trojan horse attack method aimed at the on-chip interconnection structure of a reconfigurable accelerator. Background technique [0002] Convolutional neural networks have been widely used to deal with various scene tasks, such as medical diagnosis, stock market prediction, semantic segmentation, face recognition, etc. For network reasoning, neural networks need to process hundreds of megabytes of weights and billions of computing operations. In order to speed up the reasoning process, neural network accelerators have been proposed to improve processing speed, which has become a hot spot in the research field and has received extensive attention. Accelerator designs based on different platforms have been proposed, including central processing units (CPUs), graphics processing units (GPUs), application-specific integrated circuits (ASICs), and field-program...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/76G06F15/78G06N3/063
CPCG06F15/7867G06F21/76G06N3/063
Inventor 杨晨侯佳苏阳梅魁志耿莉
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products