2021
DOI: 10.1109/tifs.2020.3046858
|View full text |Cite
|
Sign up to set email alerts
|

Stealthy and Robust Glitch Injection Attack on Deep Learning Accelerator for Target With Variational Viewpoint

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 39 publications
0
10
0
Order By: Relevance
“…The LGA achieved 55.1% ∼ 71.7% attack success rates with only two glitches injected into ten thousand to a million clock cycles of one inference. The attack success rates of the more robust SLA on all the four evaluated models were higher than 96% in any tested combinations of object-scene variational conditions [23].…”
Section: B Hardware-based Attacks On Deployed ML Modelmentioning
confidence: 81%
See 3 more Smart Citations
“…The LGA achieved 55.1% ∼ 71.7% attack success rates with only two glitches injected into ten thousand to a million clock cycles of one inference. The attack success rates of the more robust SLA on all the four evaluated models were higher than 96% in any tested combinations of object-scene variational conditions [23].…”
Section: B Hardware-based Attacks On Deployed ML Modelmentioning
confidence: 81%
“…Dedicated mathematical functions developed for complicated processors like CPU and GPU are too expensive to be implemented on the embedded processor of these small devices. Thus, lightweight computation kernels, e.g., ARM Cortex Microcontroller Software Interface Standard for Neural Network (CMSIS-NN) [56] [23] (UPK), to the ARM v7M instruction set architecture, the computation performance and energy efficiency can be further improved.…”
Section: Hardware Platforms For MLmentioning
confidence: 99%
See 2 more Smart Citations
“…This is because the 8-bit fixed width multiply-accumulate (MAC) operators have filtered out most visually imperceptible perturbations in the lower order bits of the 32-bit input data. However, such built-in error resiliency is insufficient to combat malicious hardware-oriented attacks like faults injected into the weight parameters [24,31] and the MAC units [22,23]. Recent work [23] show that maliciously injecting faults into the datapaths of real-world DNN accelerators can produce incorrect inference on the target victim.…”
Section: Introductionmentioning
confidence: 99%