2019 IEEE International Symposium on Circuits and Systems (ISCAS) 2019
DOI: 10.1109/iscas.2019.8702493
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojan Design on Neural Networks

Abstract: With the rising popularity of machine learning and the ever increasing demand for computational power, there is a growing need for hardware optimized implementations of neural networks and other machine learning models. As the technology evolves, it is also plausible that machine learning or artificial intelligence will soon become consumer electronic products and military equipment, in the form of well-trained models. Unfortunately, the modern fabless business model of manufacturing hardware, while economic, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
58
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(58 citation statements)
references
References 34 publications
(40 reference statements)
0
58
0
Order By: Relevance
“…In addition to attacks mentioned in §2.1, Chen et al proposed a backdoor attack under a more restricted scenario, where the attacker can only pollute a limited portion of training set [13]. Another line of work directly tampers with the hardware a DNN model runs on [15,28]. Such backdoor circuits could also affect the model performance when a trigger is present.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to attacks mentioned in §2.1, Chen et al proposed a backdoor attack under a more restricted scenario, where the attacker can only pollute a limited portion of training set [13]. Another line of work directly tampers with the hardware a DNN model runs on [15,28]. Such backdoor circuits could also affect the model performance when a trigger is present.…”
Section: Related Workmentioning
confidence: 99%
“…However, we are still at the rudimentary stage towards investigating the effect of network parameter attack on neural network accuracy. Neural network parameters have been attacked using different levels of hardware trojans, which require a specific pattern of input to trigger the trojan inside the network [26]. Moreover, such trojan attack requires hardware level modifications, which may not be feasible in many practical applications.…”
Section: Related Workmentioning
confidence: 99%
“…Wang Bolun et al [9] analyzed the attack success rate using various image datasets for backdoor attacks. Clements and Lao [13] proposed a method directly to access DNN hardware and cause DNN misrecognition between running processes. This method used the backdoor circuits as triggers to misrecognize the model.…”
Section: A Backdoor Attack Methodsmentioning
confidence: 99%