A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator

With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also witnessed a rise in hardware Trojan attacks targete...

Full description

Saved in:
Bibliographic Details
Main Authors: Zichu Liu, Jia Hou, Jianfei Wang, Chen Yang
Format: Article
Language:English
Published: MDPI AG 2024-08-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/8/3/34
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850261569983741952
author Zichu Liu
Jia Hou
Jianfei Wang
Chen Yang
author_facet Zichu Liu
Jia Hou
Jianfei Wang
Chen Yang
author_sort Zichu Liu
collection DOAJ
description With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also witnessed a rise in hardware Trojan attacks targeted at CNN accelerators, thereby posing substantial threats to the reliability and security of these reconfigurable systems. Despite this escalating concern, there exists a scarcity of security protection schemes explicitly tailored to counteract hardware Trojans embedded in reconfigurable CNN accelerators, and those that do exist exhibit notable deficiencies. Addressing these gaps, this paper introduces a dedicated security scheme designed to mitigate the vulnerabilities associated with hardware Trojans implanted in reconfigurable CNN accelerators. The proposed security protection scheme operates at two distinct levels: the first level is geared towards preventing the triggering of the hardware Trojan, while the second level focuses on detecting the presence of a hardware Trojan post-triggering and subsequently neutralizing its potential harm. Through experimental evaluation, our results demonstrate that this two-level protection scheme is capable of mitigating at least 99.88% of the harm cause by three different types of hardware Trojan (i.e., Trojan within RI, MAC and ReLU) within reconfigurable CNN accelerators. Furthermore, this scheme can prevent hardware Trojans from triggering whose trigger signal is derived from a processing element (PE). Notably, the proposed scheme is implemented and validated on a Xilinx Zynq XC7Z100 platform.
format Article
id doaj-art-455949cb248a41c2acd8d56d63b78397
institution OA Journals
issn 2410-387X
language English
publishDate 2024-08-01
publisher MDPI AG
record_format Article
series Cryptography
spelling doaj-art-455949cb248a41c2acd8d56d63b783972025-08-20T01:55:22ZengMDPI AGCryptography2410-387X2024-08-01833410.3390/cryptography8030034A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN AcceleratorZichu Liu0Jia Hou1Jianfei Wang2Chen Yang3School of Microelectronics, Xi’an Jiaotong University, Xi’an 710049, ChinaSchool of Microelectronics, Xi’an Jiaotong University, Xi’an 710049, ChinaSchool of Microelectronics, Xi’an Jiaotong University, Xi’an 710049, ChinaSchool of Microelectronics, Xi’an Jiaotong University, Xi’an 710049, ChinaWith the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also witnessed a rise in hardware Trojan attacks targeted at CNN accelerators, thereby posing substantial threats to the reliability and security of these reconfigurable systems. Despite this escalating concern, there exists a scarcity of security protection schemes explicitly tailored to counteract hardware Trojans embedded in reconfigurable CNN accelerators, and those that do exist exhibit notable deficiencies. Addressing these gaps, this paper introduces a dedicated security scheme designed to mitigate the vulnerabilities associated with hardware Trojans implanted in reconfigurable CNN accelerators. The proposed security protection scheme operates at two distinct levels: the first level is geared towards preventing the triggering of the hardware Trojan, while the second level focuses on detecting the presence of a hardware Trojan post-triggering and subsequently neutralizing its potential harm. Through experimental evaluation, our results demonstrate that this two-level protection scheme is capable of mitigating at least 99.88% of the harm cause by three different types of hardware Trojan (i.e., Trojan within RI, MAC and ReLU) within reconfigurable CNN accelerators. Furthermore, this scheme can prevent hardware Trojans from triggering whose trigger signal is derived from a processing element (PE). Notably, the proposed scheme is implemented and validated on a Xilinx Zynq XC7Z100 platform.https://www.mdpi.com/2410-387X/8/3/34reconfigurable CNN acceleratorhardware Trojanssecurity protection scheme
spellingShingle Zichu Liu
Jia Hou
Jianfei Wang
Chen Yang
A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
Cryptography
reconfigurable CNN accelerator
hardware Trojans
security protection scheme
title A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
title_full A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
title_fullStr A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
title_full_unstemmed A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
title_short A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
title_sort novel two level protection scheme against hardware trojans on a reconfigurable cnn accelerator
topic reconfigurable CNN accelerator
hardware Trojans
security protection scheme
url https://www.mdpi.com/2410-387X/8/3/34
work_keys_str_mv AT zichuliu anoveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator
AT jiahou anoveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator
AT jianfeiwang anoveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator
AT chenyang anoveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator
AT zichuliu noveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator
AT jiahou noveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator
AT jianfeiwang noveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator
AT chenyang noveltwolevelprotectionschemeagainsthardwaretrojansonareconfigurablecnnaccelerator