Variation Enhanced Attacks Against RRAM-Based Neuromorphic Computing System

被引:1
作者
Lv, Hao [1 ]
Li, Bing [2 ]
Zhang, Lei [1 ]
Liu, Cheng [3 ]
Wang, Ying [3 ]
机构
[1] Chinese Acad Sci, Univ Chinese Acad Sci, Inst Comp Technol, Beijing 100089, Peoples R China
[2] Capital Normal Univ, Acad Multidisciplinary Studies, Beijing 100048, Peoples R China
[3] Chinese Acad Sci, Inst Comp Technol, State Key Lab Comp Architecture, Beijing 100089, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Security; Hardware; Neuromorphic engineering; Computational modeling; Circuit faults; Resistance; Immune system; Adversarial attack; fault injection attack; neuromorphic computing system (NCS); processing in memory; reliability; resistive memory;
D O I
10.1109/TCAD.2022.3207316
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The RRAM-based neuromorphic computing system (NCS) has amassed explosive interests for its superior data processing capability and energy efficiency than traditional architectures, and thus being widely used in many data-centric applications. The reliability and security issues of the NCS, therefore, become an essential problem. In this article, we systematically investigated the adversarial threats to the RRAM-based NCS and observed that the RRAM hardware feature can be leveraged to strengthen the attack effect, which has not been granted sufficient attention by previous algorithmic attack methods. Thus, we proposed two types of hardware-aware attack methods with respect to different attack scenarios and objectives. The first is an adversarial attack, VADER, which perturbs the input samples to mislead the prediction of neural networks. The second is fault injection attack, EFI, which perturbs the network parameter space such that a specified sample will be classified to a target label, while maintaining the prediction accuracy on other samples. Both attack methods leverage the RRAM properties to improve the performance compared with the conventional attack methods. Experimental results show that our hardware-aware attack methods can achieve nearly 100% attack success rate with extremely low operational cost, while maintaining the attack stealthiness.
引用
收藏
页码:1588 / 1596
页数:9
相关论文
共 49 条
[41]   An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System [J].
Yilun Wu ;
Xicheng Lu ;
Jinshu Su ;
Peixin Chen .
Journal of Medical Systems, 2016, 40
[42]   An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System [J].
Wu, Yilun ;
Lu, Xicheng ;
Su, Jinshu ;
Chen, Peixin .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)
[43]   Research on Data Poisoning Attack against Smart Grid Cyber-Physical System Based on Edge Computing [J].
Zhu, Yanxu ;
Wen, Hong ;
Zhao, Runhui ;
Jiang, Yixin ;
Liu, Qiang ;
Zhang, Peng .
SENSORS, 2023, 23 (09)
[44]   A Randomized Switched-Mode Voltage Regulation System for IoT Edge Devices to Defend Against Power Analysis based Side Channel Attacks [J].
Khan, Mohd ;
Chen, Yu .
19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, :1771-1776
[45]   A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networks [J].
Hosseinzadeh, Mehdi ;
Ali, Saqib ;
Ahmad, Husham Jawad ;
Alanazi, Faisal ;
Yousefpoor, Mohammad Sadegh ;
Yousefpoor, Efat ;
Ahmed, Omed Hassan ;
Rahmani, Amir Masoud ;
Lee, Sang-Woong .
VEHICULAR COMMUNICATIONS, 2024, 49
[46]   Resiliency/Cost-Based Optimal Design of Distribution Network to Maintain Power System Stability Against Physical Attacks: A Practical Study Case [J].
Ghiasi, Mohammad ;
Dehghani, Moslem ;
Niknam, Taher ;
Baghaee, Hamid Reza ;
Padmanaban, Sanjeevikumar ;
Gharehpetian, Gevork B. ;
Aliev, Hamdulah .
IEEE ACCESS, 2021, 9 :43862-43875
[47]   Reputation-based Collaborative Distributed Energy Management System Framework for Cyber-physical Microgrids: Resilience against Profit-driven Attacks [J].
Cheng, Zheyuan ;
Chow, Mo-Yuen .
2020 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2020,
[48]   A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks [J].
Thankappan, Manesh ;
Rifa-Pous, Helena ;
Garrigues, Carles .
IEEE ACCESS, 2024, 12 :23096-23121
[49]   An In-Situ Acquisition, Near-Data Processing, and Low-Power Neuromorphic Computing System Based on WO<roman>3-</roman>x/CeO<roman>2-</roman>x Heterojunction Memristor Array [J].
Yang, Yang ;
Meng, Haotian ;
Zhang, Chunwei ;
Li, Yang .
IEEE TRANSACTIONS ON ELECTRON DEVICES, 2025, 72 (06) :2970-2976