PUF-Based Intellectual Property Protection for CNN Model

被引:4
作者
Li, Dawei [1 ]
Ren, Yangkun [1 ]
Liu, Di [1 ]
Guan, Zhenyu [1 ]
Zhang, Qianyun [1 ]
Wang, Yanzhao [2 ]
Liu, Jianwei [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Chinabond Finance & Informat Technol Co Ltd, Blockchain Lab, Beijing 100044, Peoples R China
来源
KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2022, PT III | 2022年 / 13370卷
基金
北京市自然科学基金;
关键词
PUF; CNN; IP protection; FPGA; Machine learning;
D O I
10.1007/978-3-031-10989-8_57
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It usually takes a lot of time and resources to train a high-accurate Machine Learning model, so it is believed that the trainer owns the Intellectual Property (IP) of the model. With the help of various computing accelerators, a Machine Learning model can run on FPGAs, and model providers render services by selling FPGAs with models embedded. Unauthorized copying of the model infringes the owner's copyrights, so there is an urgent need for the effective protection of model IP. In this paper, we propose a Physical Unclonable Function (PUF) based CNN model IP protection scheme. Before selling the model, the model providers confuse the parameters of the model with the response of a PUF, then embed the confused model into the FPGA where the PUF is. In this way, the protected model can get correct results only if running on the specific FPGA. Experimental results show that the performance difference between the confused model and the original model is negligible, and it is difficult for the adversary to get the correct parameters. Our approach effectively protects the IP of the model by restricting the model to only run on the specified FPGA and is easily extended to other models with convolutional layers and linear fully connected layers.
引用
收藏
页码:722 / 733
页数:12
相关论文
共 37 条
[1]  
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[2]  
Berger J. O., 1985, Statistical decision theory and Bayesian analysis, DOI 10.1007/978-1-4757-4286-2
[3]  
Chen HL, 2018, Arxiv, DOI arXiv:1811.03713
[4]  
Chen J., 2021, arXiv, DOI DOI 10.48550/ARXIV.2112.05588
[5]   T-DLA: An Open-source Deep Learning Accelerator for Ternarized DNN Models on Embedded FPGA [J].
Chen, Yao ;
Zhang, Kai ;
Gong, Cheng ;
Hao, Cong ;
Zhang, Xiaofan ;
Li, Tao ;
Chen, Deming .
2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, :13-18
[6]  
Ciresan D, 2012, PROC CVPR IEEE, P3642, DOI 10.1109/CVPR.2012.6248110
[7]   Watermarking Deep Neural Networks for Embedded Systems [J].
Guo, Jia ;
Potkonjak, Miodrag .
2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
[8]   PUF Based Pay-per-Device Scheme for IP Protection of CNN Model [J].
Guo, Qingli ;
Ye, Jing ;
Gong, Yue ;
Hu, Yu ;
Li, Xiaowei .
2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, :115-120
[9]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[10]  
Holcomb D.E., 2007, P C RFID SEC, V7, P01