2022
DOI: 10.1109/les.2022.3159541
|View full text |Cite
|
Sign up to set email alerts
|

Novel Hardware Trojan Attack on Activation Parameters of FPGA-Based DNN Accelerators

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…The Trojan incurred minimal hardware overhead and negligible power consumption, with average hardware overhead of 0.5% and 0.2% and power consumption of 0.622% and 0.187% in SIMD and NVDLA accelerators, respectively [ 26 ]. Novel hardware Trojan attacks specifically targeting DNN hardware accelerators implemented on FPGA were introduced [ 27 ]. These hardware Trojans aim to modify the activation parameters of the DNN within the accelerator.…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 3 more Smart Citations
“…The Trojan incurred minimal hardware overhead and negligible power consumption, with average hardware overhead of 0.5% and 0.2% and power consumption of 0.622% and 0.187% in SIMD and NVDLA accelerators, respectively [ 26 ]. Novel hardware Trojan attacks specifically targeting DNN hardware accelerators implemented on FPGA were introduced [ 27 ]. These hardware Trojans aim to modify the activation parameters of the DNN within the accelerator.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Moreover, security threats associated with CNN accelerators have extended into the hardware domain. Prior works have introduced various hardware attack methods, including reverse engineering [ 20 ] and hardware Trojans [ 21 , 22 , 23 , 24 , 25 , 26 , 27 ]. Among these threats, hardware Trojan attacks are considered a major security concern [ 28 , 29 , 30 ].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…These deceptive programs are often concealed within seemingly innocuous email attachments or free downloads. Upon opening such attachments or initiating downloads, the embedded malware is introduced to the user's device, enabling the malicious code to execute the attacker's intended actions [7]- [9]. Incidents involving Trojan Horse attacks have emerged as significant cybersecurity risks, inflicting financial losses, and operational disruptions on individuals and businesses.…”
Section: Introductionmentioning
confidence: 99%