Proceedings of the 2020 on Great Lakes Symposium on VLSI 2020
DOI: 10.1145/3386263.3407593
|View full text |Cite
|
Sign up to set email alerts
|

Blurring Boundaries: A New Way to Secure Approximate Computing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…Those case studies mentioned above motivate us to perform a systematic study on the hardware attack methods that could harm AC systems. Our recent work [78] performs a preliminary analysis on security threats, which have emerged due to the easier identification of boundaries between precise and approximate modules. In spite of the recent progress that has been made in References [47,52,78,79], a comprehensive study on security challenges brought by various approximation techniques is not available yet.…”
Section: Softwarementioning
confidence: 99%
See 4 more Smart Citations
“…Those case studies mentioned above motivate us to perform a systematic study on the hardware attack methods that could harm AC systems. Our recent work [78] performs a preliminary analysis on security threats, which have emerged due to the easier identification of boundaries between precise and approximate modules. In spite of the recent progress that has been made in References [47,52,78,79], a comprehensive study on security challenges brought by various approximation techniques is not available yet.…”
Section: Softwarementioning
confidence: 99%
“…Our recent work [78] performs a preliminary analysis on security threats, which have emerged due to the easier identification of boundaries between precise and approximate modules. In spite of the recent progress that has been made in References [47,52,78,79], a comprehensive study on security challenges brought by various approximation techniques is not available yet. The investigation on the security threats on AC systems is still in its youth due to the following reasons: (1) as different abstraction layers have diverse approximation mechanisms, it is difficult to formulate the security problem in a systematic manner; (2) there does not exist a unified framework to standardize the procedure for discovering the security vulnerabilities of AC systems;…”
Section: Softwarementioning
confidence: 99%
See 3 more Smart Citations