A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also witnessed a rise in hardware Trojan attacks targete...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-08-01
|
| Series: | Cryptography |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2410-387X/8/3/34 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850261569983741952 |
|---|---|
| author | Zichu Liu Jia Hou Jianfei Wang Chen Yang |
| author_facet | Zichu Liu Jia Hou Jianfei Wang Chen Yang |
| author_sort | Zichu Liu |
| collection | DOAJ |
| description | With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also witnessed a rise in hardware Trojan attacks targeted at CNN accelerators, thereby posing substantial threats to the reliability and security of these reconfigurable systems. Despite this escalating concern, there exists a scarcity of security protection schemes explicitly tailored to counteract hardware Trojans embedded in reconfigurable CNN accelerators, and those that do exist exhibit notable deficiencies. Addressing these gaps, this paper introduces a dedicated security scheme designed to mitigate the vulnerabilities associated with hardware Trojans implanted in reconfigurable CNN accelerators. The proposed security protection scheme operates at two distinct levels: the first level is geared towards preventing the triggering of the hardware Trojan, while the second level focuses on detecting the presence of a hardware Trojan post-triggering and subsequently neutralizing its potential harm. Through experimental evaluation, our results demonstrate that this two-level protection scheme is capable of mitigating at least 99.88% of the harm cause by three different types of hardware Trojan (i.e., Trojan within RI, MAC and ReLU) within reconfigurable CNN accelerators. Furthermore, this scheme can prevent hardware Trojans from triggering whose trigger signal is derived from a processing element (PE). Notably, the proposed scheme is implemented and validated on a Xilinx Zynq XC7Z100 platform. |
| format | Article |
| id | doaj-art-455949cb248a41c2acd8d56d63b78397 |
| institution | OA Journals |
| issn | 2410-387X |
| language | English |
| publishDate | 2024-08-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Cryptography |
| spelling | doaj-art-455949cb248a41c2acd8d56d63b783972025-08-20T01:55:22ZengMDPI AGCryptography2410-387X2024-08-01833410.3390/cryptography8030034A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN AcceleratorZichu Liu0Jia Hou1Jianfei Wang2Chen Yang3School of Microelectronics, Xi’an Jiaotong University, Xi’an 710049, ChinaSchool of Microelectronics, Xi’an Jiaotong University, Xi’an 710049, ChinaSchool of Microelectronics, Xi’an Jiaotong University, Xi’an 710049, ChinaSchool of Microelectronics, Xi’an Jiaotong University, Xi’an 710049, ChinaWith the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also witnessed a rise in hardware Trojan attacks targeted at CNN accelerators, thereby posing substantial threats to the reliability and security of these reconfigurable systems. Despite this escalating concern, there exists a scarcity of security protection schemes explicitly tailored to counteract hardware Trojans embedded in reconfigurable CNN accelerators, and those that do exist exhibit notable deficiencies. Addressing these gaps, this paper introduces a dedicated security scheme designed to mitigate the vulnerabilities associated with hardware Trojans implanted in reconfigurable CNN accelerators. The proposed security protection scheme operates at two distinct levels: the first level is geared towards preventing the triggering of the hardware Trojan, while the second level focuses on detecting the presence of a hardware Trojan post-triggering and subsequently neutralizing its potential harm. Through experimental evaluation, our results demonstrate that this two-level protection scheme is capable of mitigating at least 99.88% of the harm cause by three different types of hardware Trojan (i.e., Trojan within RI, MAC and ReLU) within reconfigurable CNN accelerators. Furthermore, this scheme can prevent hardware Trojans from triggering whose trigger signal is derived from a processing element (PE). Notably, the proposed scheme is implemented and validated on a Xilinx Zynq XC7Z100 platform.https://www.mdpi.com/2410-387X/8/3/34reconfigurable CNN acceleratorhardware Trojanssecurity protection scheme |
| spellingShingle | Zichu Liu Jia Hou Jianfei Wang Chen Yang A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator Cryptography reconfigurable CNN accelerator hardware Trojans security protection scheme |
| title | A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator |
| title_full | A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator |
| title_fullStr | A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator |
| title_full_unstemmed | A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator |
| title_short | A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator |
| title_sort | novel two level protection scheme against hardware trojans on a reconfigurable cnn accelerator |
| topic | reconfigurable CNN accelerator hardware Trojans security protection scheme |
| url | https://www.mdpi.com/2410-387X/8/3/34 |
| work_keys_str_mv | AT zichuliu anoveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator AT jiahou anoveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator AT jianfeiwang anoveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator AT chenyang anoveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator AT zichuliu noveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator AT jiahou noveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator AT jianfeiwang noveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator AT chenyang noveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator |