Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3386263.3407594acmotherconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

Is It Approximate Computing or Malicious Computing?

Published: 07 September 2020 Publication History

Abstract

Approximate computing (AC) is an attractive energy efficient technique that can be implemented at almost all the design levels including data, algorithm, and hardware. The basic idea behind AC is to deliberately control the trade-off between computation accuracy and energy efficiency. However, with the introduction of AC, traditional computing frameworks are having many potential security vulnerabilities. In this paper, we analyze these vulnerabilities and the associated attacks as well as corresponding countermeasures. More importantly, we propose the vulnerability at data level and demonstrate that without appropriate security mechanism, adversaries can modify the data and convert a secure and trusted AC process to one that produces unexpected errors in the final output. Furthermore, it is difficult to distinguish whether such errors are caused by the approximation nature of AC or from malicious modification and injection. Finally, we propose the information hiding based countermeasures to defend against both existing attacks and the proposed data level attacks, which helps to answer the question: given an error in AC, whether it comes from approximation or it is maliciously introduced.

Supplementary Material

MP4 File (3386263.3407594.mp4)
Presentation video

References

[1]
A. Rahmati, M. Hicks, D. E. Holcomb and K. Fu, "Probable cause: The deanonymizing effects of approximate DRAM," International Symposium on Computer Architecture. ACM, 2015.
[2]
S. Mittal, "A survey of techniques for approximate computing," ACM Computing Surveys (CSUR). 2016, Vol. 48(4), pp. 62.
[3]
W. Liu, C. Gu, G. Qu and M. O'Neill, "Approximate Computing and Its Application to Hardware Security," Cyber-Physical Systems Security. Springer, Cham, 2018, pp. 43--67.
[4]
F. Regazzoni, C. Alippi and I. Polian, "Security: the dark side of approximate computing?" Proceedings of the International Conference on Computer-Aided Design. ACM, 2018, pp. 44.
[5]
S. Keshavarz and D. Holcomb, "Privacy leakages in approximate adders," IEEE International Symposium on Circuits and Systems (ISCAS), 2017, pp. 1--4.
[6]
P. Yellu, N. Boskov, M. A. Kinsy and Q. Yu, "Security Threats in Approximate Computing Systems," Proceedings of the 2019 on Great Lakes Symposium on VLSI. ACM, 2019, pp. 387--392.
[7]
H. Esmaeilzadeh, A. Sampson, L. Ceze and D. Burger, "Architecture support for disciplined approximate programming," ACM SIGPLAN Notices. ACM, 2012, Vol. 47(4), pp. 301--312.
[8]
M. Cho, J. Schlessman, W. Wolf, et al, "Reconfigurable SRAM architecture with spatial voltage scaling for low power mobile multimedia applications," IEEE transactions on very large scale integration (VLSI) systems. 2009, Vol. 19(1), pp. 161--165.
[9]
R. K. Venkatesan, S. Herr and E. Rotenberg, "Retention-aware placement in DRAM (RAPID): software methods for quasi-nonvolatile DRAM," The Twelfth International Symposium on High Performance Computer Architecture. 2006.
[10]
S. Sidiroglou-Douskos, S. Misailovic, H. Hoffmann, et al, "Managing performance vs. accuracy trade-offs with loop perforation," Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering. ACM, 2011, pp. 124--134.
[11]
S. Li, S. Park, S. Mahlke. "Sculptor: Flexible Approximation with Selective Dynamic Loop Perforation," Proceedings of the 2018 International Conference on Supercomputing. ACM, 2018, pp. 341--351.
[12]
S. E. Quadir, J. Chen, D. Forte, et al, "A survey on chip to system reverse engineering," ACM journal on emerging technologies in computing systems (JETC). 2016, Vol. 13(1), pp. 6.
[13]
N. Zhu, W. L. Goh, W. Zhang, K. S. Yeo, et al. "Design of low-power high-speed truncation-error-tolerant adder and its application in digital signal processing," IEEE transactions on very large scale integration (VLSI) systems 18.8, 2009, pp. 1225--1229.
[14]
Y. Wang, Q. Xu, G. Qu, J. Dong. "Information Hiding behind Approximate Computation," Proceedings of the 2019 on Great Lakes Symposium on VLSI. ACM, 2019, pp. 405--410.
[15]
M.T. Arafin, M. Gao, and G. Qu, "VOLtA: Voltage Over-scaling Based Lightweight Authentication for IoT Applications", 22nd Asia and South Pacific Design Automation Conference (ASPDAC'17), January, 2017.
[16]
M. Gao, Q. Wang, and G. Qu, "Energy Efficient Runtime Approximate Computing on Data Flow Graphs", IEEE/ACM International Conference on Computer Aided Design (ICCAD'17), November 2017.
[17]
M. Gao, Q. Wang, M.T. Arafin, Y. Lyu, and G. Qu. "Approximate Computing for Low Power and Security in the Internet of Things", IEEE Computer, Vol. 50, No. 6, pp. 27--34, June 9, 2017.

Cited By

View all
  • (2024)INEAD: Intermediate Node Evaluation-Based Attack Detection for Secure Approximate Computing SystemsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.332882643:3(716-727)Online publication date: Mar-2024
  • (2024)A Novel Methodology for Processor based PUF in Approximate Computing2024 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS58744.2024.10558354(1-5)Online publication date: 19-May-2024
  • (2024)Exploring Approximate Memory for Energy-Efficient Computing2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS)10.1109/ICETSIS61505.2024.10459495(1685-1689)Online publication date: 28-Jan-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
GLSVLSI '20: Proceedings of the 2020 on Great Lakes Symposium on VLSI
September 2020
597 pages
ISBN:9781450379441
DOI:10.1145/3386263
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 September 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. approximate computing
  2. information hiding
  3. security

Qualifiers

  • Research-article

Conference

GLSVLSI '20
GLSVLSI '20: Great Lakes Symposium on VLSI 2020
September 7 - 9, 2020
Virtual Event, China

Acceptance Rates

Overall Acceptance Rate 312 of 1,156 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)21
  • Downloads (Last 6 weeks)2
Reflects downloads up to 27 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)INEAD: Intermediate Node Evaluation-Based Attack Detection for Secure Approximate Computing SystemsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.332882643:3(716-727)Online publication date: Mar-2024
  • (2024)A Novel Methodology for Processor based PUF in Approximate Computing2024 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS58744.2024.10558354(1-5)Online publication date: 19-May-2024
  • (2024)Exploring Approximate Memory for Energy-Efficient Computing2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS)10.1109/ICETSIS61505.2024.10459495(1685-1689)Online publication date: 28-Jan-2024
  • (2023)Approximation Opportunities in Edge Computing Hardware: A Systematic Literature ReviewACM Computing Surveys10.1145/357277255:12(1-49)Online publication date: 3-Mar-2023
  • (2023)Securing Approximate Computing Systems via Obfuscating Approximate-Precise BoundaryIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2022.316826142:1(27-40)Online publication date: Jan-2023
  • (2023)MAAS: Hiding Trojans in Approximate Circuits2023 24th International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED57927.2023.10129286(1-6)Online publication date: 5-Apr-2023
  • (2022)Leveraging Intermediate Node Evaluation to Secure Approximate Computing for AI Applications2022 IEEE International Symposium on Technologies for Homeland Security (HST)10.1109/HST56032.2022.10025430(1-8)Online publication date: 14-Nov-2022
  • (2021)Security Enhancements for Approximate Machine LearningProceedings of the 2021 on Great Lakes Symposium on VLSI10.1145/3453688.3461753(461-466)Online publication date: 22-Jun-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media