Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3386263.3406955acmotherconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

HTcatcher: Finite State Machine and Feature Verifcation for Large-scale Neuromorphic Computing Systems

Published: 07 September 2020 Publication History

Abstract

Recent advances in resistive synaptic devices have enabled the emergence of brain-inspired smart chips. These chips can execute complex cognitive tasks in digital signal processing precisely and efficiently using an efficient neuromorphic system. The neuromorphic synapses used in such chips, however, are very sensitive to the external environment, thereby weakening their resistance to malicious modifications such as hardware Trojans and backdoors. Accordingly, in this paper, we propose HTcatcher, a security verification technique for hardware threat detection in neuromorphic computing systems, incorporating finite state machine and feature verification simultaneously, which has never been considered in prior work. Furthermore, we propose a pseudo-random matrix verifying technique for memory optimization, which can reduce the memory overhead of the multi-dimensional features in the system significantly. Experimental results confirm that the proposed method can identify the malicious modifications in the system accurately, while reducing the memory usage by 25%-50%.

Supplementary Material

MP4 File (3386263.3406955.mp4)
Presentation video

References

[1]
D. S. Modha. Neuromorphic and synaptronic spiking neural network with synaptic weights learned using simulation. U.S. Patent, 8,515,885, 2013--8--20.
[2]
P. Yao, H. Wu, B. Gao, et al. Face classification using electronic synapses. Nature Communications., vol. 8, no. 15199. 2017.
[3]
Jiang Y, Huang P, Zhu D, et al. Design and hardware implementation of neuromorphic systems with RRAM synapses and threshold-controlled neurons for pattern recognition. IEEE Transactions on Circuits and Systems I, vol. 65, no. 9, pp. 2726--2738, 2018.
[4]
Ielmini, Daniele. Brain-inspired computing with resistive switching memory (RRAM): Devices, synapses and neural networks. Microelectronic Engineering., vol. 190, pp. 44--53, 2018.
[5]
S. Yu, Y. Wu, et al. An electronic synapse device based on metal oxide resistive switching memory for neuromorphic computation. IEEE Trans on Electron Devices, vol. 58, no. 8, pp. 2729--2737, 2011.
[6]
R. C. Rodrigo, L. Javier and G. Stefanos. Evolution and trends in IoT security. Computer, vol. 51, no. 7, pp. 16--25, 2018.
[7]
M. Li, B. Yu, Y. Lin, et al. A practical split manufacturing framework for Trojan prevention via simultaneous wire lifting and cell insertion. proc. of ASP-DAC, 2018, pp. 256--270.
[8]
Beringuierboher N, Lacruche M, Elbaze D, et al. Body biasing injection attacks in practice. Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016, pp. 49--54.
[9]
Yang K, Hicks M, Dong Q, et al. Exploiting the analog properties of digital circuits for malicious hardware. Communications of the ACM, vol. 60, no. 9, pp. 83--91, 2017.
[10]
N. Beringuier-Boher, H. David, V. Beroulle, et al. Increasing the security level of analog IPs by using a dedicated vulnerability analysis methodology. proc. of ISQED, 2013.
[11]
Hassan Salmani. COTD: reference-free hardware Trojan detection and recovery based on controllability and observability in gate-level Netlist. IEEE Transactions on Information Forensics & Security, vol. 12, no. 2, pp. 338--350, 2017.
[12]
B. Liu, C. Yang, H. Li, et al. Security of neuromorphic systems: challenges and solutions. proc. of ISCAS, 2016, pp. 1326--1329.
[13]
L. X. Xia, et al. Fault-tolerant training enabled by on-line fault detection for RRAM-based neural computing systems. IEEE Trans on Computer-Aided Design of Integrated Circuits and Systems., 2018.
[14]
S. Zhang, G. L. Zhang, B. Li, H. H. Li and U. Schlichtmann. Aging-aware lifetime enhancement for memristor-based neuromorphic computing. proc. of DATE, 2019, pp. 1751--1756.
[15]
Y. Zhu, G. L. Zhang, T. Wan, B. Li, Y. Shi, T.-Y. Ho and U. Schlichtmann. Statistical training for neuromorphic computing using memristor-based crossbars considering process variations and noise. proc. of DATE, 2020
[16]
Dong C, Zhang F, Liu X, et al. A locating method for multi-purposes HTs based on the boundary network. IEEE Access, vol.7, pp. 110936--110950, 2019.
[17]
Q. Liu, T. Liu, Z. Liu, et al. Security analysis and enhancement of model compressed deep learning systems under adversarial attacks. proc. of ASP-DAC, 2018, pp. 721--7
[18]
A. Sengupta, D. Roy, S. P. Mohanty. Triple-phase watermarking for reusable IP core protection during architecture synthesis. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems., vol. 37, no. 4, pp. 742--755, 2018.
[19]
J. Magana, D. Shi, J. Melchert, et al. Are proximity attacks a threat to the security of split manufacturing of integrated circuits?IEEE Transactions on Very Large Scale Integration (VLSI) Systems., vol. 25, no. 12, pp. 3406--3419, 2017.
[20]
M. Oya, N. Yamashita, T. Okamura, et al. Hardware-trojans rank: quantitative evaluation of security threats at gate-level netlists by pattern matching. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,vol. E99, no. A(12), pp. 2335--2347, 2016.
[21]
H. Ding, J. Wang and J. Zhong. Temperature-variation based hardware trojan detection through ring oscillator. Electronics Letters, vol. 52, no. 15, pp. 1302--1304, 2016.
[22]
Hassan Salmani. Hardware trojans in analog and mixed-signal integrated circuits. Trusted Digital Circuits, pp. 121--131. Springer, 2018.
[23]
R. S. Chakraborty, S. Pagliarini, J. Mathew, et al. A flexible online checking technique to enhance hardware trojan horse detectability by reliability analysis. IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 2, pp. 260--270, 2017.
[24]
A. V. Karthik, et al. ABCD-NL: Approximating continuous non-linear dynamical systems using purely boolean models for analog/mixed-signal verification. proc. of ASP-DAC, 2014, pp. 250--255.
[25]
Karthik A V, et al. ABCD-L: Approximating continuous linear systems using Boolean models. proc. of DAC, 2013, pp. 1--9.
[26]
M. Bidmeshki, A. Antonopoulos, Y. Makris. Information flow tracking in analog/mixed-signal designs through proof-carrying hardware IP. proc. of DATE, 2017, pp. 1703--1708.
[27]
K. Yang, M. Hicks, Q. Dong, et al. A2: Analog malicious hardware. proc. of SP, 2016, pp. 18--37.
[28]
Hashemi S, Tann H, Reda S. BLASYS: Approximate logic synthesis using boolean matrix factorization. proc. of DAC, 2018, pp. 1--6.

Cited By

View all
  • (2024)Hardware Trojans Detection and Prevention Techniques ReviewWireless Personal Communications10.1007/s11277-024-11334-6136:2(1147-1182)Online publication date: 25-Jun-2024
  • (2023)A Cost-Driven Method for Deep-Learning-Based Hardware Trojan DetectionSensors10.3390/s2312550323:12(5503)Online publication date: 11-Jun-2023
  • (2023)A Pre-Silicon Detection Based on Deep Learning Model for Hardware TrojansJournal of Circuits, Systems and Computers10.1142/S021812662450144533:08Online publication date: 8-Dec-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
GLSVLSI '20: Proceedings of the 2020 on Great Lakes Symposium on VLSI
September 2020
597 pages
ISBN:9781450379441
DOI:10.1145/3386263
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 September 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. RRAM cells
  2. feature analysis
  3. hardware Trojan
  4. neuromorphic system
  5. security verification

Qualifiers

  • Research-article

Conference

GLSVLSI '20
GLSVLSI '20: Great Lakes Symposium on VLSI 2020
September 7 - 9, 2020
Virtual Event, China

Acceptance Rates

Overall Acceptance Rate 312 of 1,156 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)2
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Hardware Trojans Detection and Prevention Techniques ReviewWireless Personal Communications10.1007/s11277-024-11334-6136:2(1147-1182)Online publication date: 25-Jun-2024
  • (2023)A Cost-Driven Method for Deep-Learning-Based Hardware Trojan DetectionSensors10.3390/s2312550323:12(5503)Online publication date: 11-Jun-2023
  • (2023)A Pre-Silicon Detection Based on Deep Learning Model for Hardware TrojansJournal of Circuits, Systems and Computers10.1142/S021812662450144533:08Online publication date: 8-Dec-2023
  • (2022)RLocHT: A Hardware Trojans Localization Method Utilizing Deep Learning at the Gate-Level2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)10.1109/ITAIC54216.2022.9836937(2290-2294)Online publication date: 17-Jun-2022
  • (2020)Hardware Trojans in Chips: A Survey for Detection and PreventionSensors10.3390/s2018516520:18(5165)Online publication date: 10-Sep-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media