Variation Enhanced Attacks Against RRAM-Based Neuromorphic Computing System

被引:1
作者
Lv, Hao [1 ]
Li, Bing [2 ]
Zhang, Lei [1 ]
Liu, Cheng [3 ]
Wang, Ying [3 ]
机构
[1] Chinese Acad Sci, Univ Chinese Acad Sci, Inst Comp Technol, Beijing 100089, Peoples R China
[2] Capital Normal Univ, Acad Multidisciplinary Studies, Beijing 100048, Peoples R China
[3] Chinese Acad Sci, Inst Comp Technol, State Key Lab Comp Architecture, Beijing 100089, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Security; Hardware; Neuromorphic engineering; Computational modeling; Circuit faults; Resistance; Immune system; Adversarial attack; fault injection attack; neuromorphic computing system (NCS); processing in memory; reliability; resistive memory;
D O I
10.1109/TCAD.2022.3207316
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The RRAM-based neuromorphic computing system (NCS) has amassed explosive interests for its superior data processing capability and energy efficiency than traditional architectures, and thus being widely used in many data-centric applications. The reliability and security issues of the NCS, therefore, become an essential problem. In this article, we systematically investigated the adversarial threats to the RRAM-based NCS and observed that the RRAM hardware feature can be leveraged to strengthen the attack effect, which has not been granted sufficient attention by previous algorithmic attack methods. Thus, we proposed two types of hardware-aware attack methods with respect to different attack scenarios and objectives. The first is an adversarial attack, VADER, which perturbs the input samples to mislead the prediction of neural networks. The second is fault injection attack, EFI, which perturbs the network parameter space such that a specified sample will be classified to a target label, while maintaining the prediction accuracy on other samples. Both attack methods leverage the RRAM properties to improve the performance compared with the conventional attack methods. Experimental results show that our hardware-aware attack methods can achieve nearly 100% attack success rate with extremely low operational cost, while maintaining the attack stealthiness.
引用
收藏
页码:1588 / 1596
页数:9
相关论文
共 44 条
  • [21] Memristor Crossbar-Based Neuromorphic Computing System: A Case Study
    Hu, Miao
    Li, Hai
    Chen, Yiran
    Wu, Qing
    Rose, Garrett S.
    Linderman, Richard W.
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2014, 25 (10) : 1864 - 1878
  • [22] Defending edge computing based metaverse AI against adversarial attacks
    Yi, Zhangao
    Qian, Yongfeng
    Chen, Min
    Alqahtani, Salman A.
    Hossain, M. Shamim
    [J]. AD HOC NETWORKS, 2023, 150
  • [23] PAWN: Programmed Analog Weights for Non-Linearity Optimization in Memristor-Based Neuromorphic Computing System
    Khan, Saleh Ahmad
    Oli-Uz-Zaman, Md.
    Wang, Jinhui
    [J]. IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2023, 13 (01) : 436 - 444
  • [24] Radiation Tolerance of 3-D NAND Flash Based Neuromorphic Computing System
    Hasan, Md Mehedi
    Raquibuzzaman, Md
    Chatterjee, Indranil
    Ray, Biswajit
    [J]. 2020 IEEE INTERNATIONAL RELIABILITY PHYSICS SYMPOSIUM (IRPS), 2020,
  • [25] Three-Dimensional Neuromorphic Computing System With Two-Layer and Low-Variation Memristive Synapses
    An, Hongyu
    Al-Mamun, Mohammad Shah
    Orlowski, Marius K.
    Liu, Lingjia
    Yi, Yang
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (03) : 400 - 409
  • [26] Stability-Based Analysis and Defense against Backdoor Attacks on Edge Computing Services
    Zhao, Yi
    Xu, Ke
    Wang, Haiyang
    Li, Bo
    Jia, Ruoxi
    [J]. IEEE NETWORK, 2021, 35 (01): : 163 - 169
  • [27] An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
    Krauss, Christoph
    Schneider, Markus
    Eckert, Claudia
    [J]. 2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 586 - 591
  • [28] Enhanced-Adaptive Pattern Attack Recognition Technique (E-APART) Against EDoS Attacks in Cloud Computing
    Thaper, Rohit
    Verma, Amandeep
    [J]. JOURNAL OF CASES ON INFORMATION TECHNOLOGY, 2015, 17 (03) : 41 - 55
  • [29] Countermeasures for timing-based side-channel attacks against shared, modern computing hardware
    Montasari, Reza
    Hill, Richard
    Hosseinian-Far, Amin
    Montaseri, Farshad
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (03) : 294 - 320
  • [30] A2HD: Adaptive Adversarial Training for Hyperdimensional Computing-Based Intrusion Detection Against Adversarial Attacks
    Gungor, Onat
    Rosing, Tajana
    Aksanli, Bans
    [J]. 2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 107 - 113