Neural network accelerator fault vulnerability assessment method based on hardware feature information

A technology of hardware feature information and neural network, which is applied in the field of neural network accelerator fault vulnerability assessment based on hardware feature information, can solve the problems of less verification work and low accuracy of network layer-by-layer robustness, and achieve security, Refine for fine-grained effects

Pending Publication Date: 2022-05-27
ZHEJIANG UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such simplistic assumptions are likely to be mismatched with actual fault attack scenarios on DNN hardware, leading to lower accuracy of results given by these evaluation schemes.
In addition, most of the curr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Neural network accelerator fault vulnerability assessment method based on hardware feature information
  • Neural network accelerator fault vulnerability assessment method based on hardware feature information
  • Neural network accelerator fault vulnerability assessment method based on hardware feature information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0084] In order to verify the effectiveness of a method for evaluating the fault vulnerability of a neural network accelerator based on hardware feature information of the present invention, experiments were carried out. refer to image 3 , the target neural network is selected as VGG16, and the fault category is clock glitch fault.

[0085] image 3 a is the effect of using Johnson's SU formula to fit the damage probability of data blocks. It can be seen from the figure that Johnson's SU can perfectly fit the damage probability distribution of actual hardware data blocks. image 3 b is the difference between the performance of software simulated faults and the performance of hardware faults in actual scenarios. It can be seen that the differences between most of the layers in VGG16 are within 0.1, indicating the accuracy of software simulated faults. image 3 c is the result of inter-layer search of VGG16. It can be seen that VGG16 has high vulnerability at layers 1, 14, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a neural network accelerator fault vulnerability assessment method based on hardware feature information, which comprises the following steps: extracting hardware information features of a neural network operating on a hardware accelerator, the information features comprising features of the neural network in normal operation and information features of the neural network in fault attack; and modeling fault attack by using the extracted information features, predicting the influence of the fault on an actual neural network hardware accelerator through a fault distribution simulation and fault probability simulation method, and judging the vulnerability of the neural network when the neural network is faced with the fault attack through an interlayer search method. According to the method, an existing hardware fault vulnerability assessment framework is improved, and the accuracy of fault simulation is improved through a software and hardware integrated verification method while the fine granularity is optimized. The improved method has a good effect in evaluating common hardware fault attacks, and has a certain application value in the field of hardware fault evaluation.

Description

technical field [0001] The invention belongs to the fields of hardware failure safety evaluation and the like, and in particular relates to a failure vulnerability evaluation method of a neural network accelerator based on hardware feature information. Background technique [0002] Deep learning powers a wide variety of edge devices, and the widespread use of neural network hardware accelerators has raised concerns about their security and robustness. Although Deep Neural Network (DNN) models have evolved to outperform humans in terms of prediction, their predictive behavior involves a complex training process and adaptation to a large number of weight parameters, which makes the computation of neural networks unexplainable sex. When errors (whether artificial or natural) occur in the computation of DNN models deployed on hardware (such as FPGAs, ASICs, etc.), the inference process of neural networks is disrupted. This makes the fault tolerance of different DNN models a to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F30/27G06K9/62G06N3/04G06N3/063G06N3/08G06F111/08G06F119/02
CPCG06F30/27G06N3/08G06F2111/08G06F2119/02G06N3/065G06N3/047G06N3/045G06F18/2415
Inventor 张帆宣博瀚
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products