Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks

Archive ouverte : Communication dans un congrès

Islam, Shohidul | Alouani, Ihsen | Khasawneh, Khaled

Edité par HAL CCSD ; IEEE

International audience. Deep neural networks (DNNs) are shown to be vulnerable to adversarial attacks-- carefully crafted additive noise that undermines DNNs integrity. Previously proposed defenses against these attacks require substantial overheads, making it challenging to deploy these solutions in power and computational resource-constrained devices, such as embedded systems and the Edge. In this paper, we explore the use of voltage overscaling (VOS) as a lightweight defense against adversarial attacks. Specifically, we exploit the stochastic timing violations of VOS to implement a moving-target defense for DNNs. Our experimental results demonstrate that VOS guarantees effective defense against different attack methods, does not require any software/hardware modifications, and offers a by-product reduction in power consumption.

Consulter en ligne

Suggestions

Du même auteur

Defensive approximation: securing CNNs using approximate computing

Archive ouverte: Communication dans un congrès

Guesmi, Amira | 2021-04-19

International audience. In the past few years, an increasing number of machine-learning and deep learning structures, such as Convolutional Neural Networks (CNNs), have been applied to solving a wide range of real-l...

ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints

Archive ouverte: Communication dans un congrès

Guesmi, Amira | 2022-07-18

International audience. Advances in deep-learning have enabled a wide range of promising applications. However, these systems are vulnerable to adversarial attacks; adversarially crafted pertur-bations to their inpu...

CNTFET-Based Ternary Multiply-and-Accumulate Unit

Archive ouverte: Article de revue

Mohammaden, Amr | 2022

International audience. Multiply-Accumulate (MAC) is one of the most commonly used operations in modern computing systems due to its use in matrix multiplication, signal processing, and in new applications such as m...

Du même sujet

Essential math for data science : take control of your data with fundamenta...

Livre | Nield, Thomas. Auteur | 2022

To succeed in data science you need some math proficiency. But not just any math. This common-sense guide provides a clear, plain English survey of the math you'll need in data science, including probability, statistics, hypothesi...

An Investigation on Inherent Robustness of Posit Data Representation

Archive ouverte: Communication dans un congrès

Alouani, Ihsen | 2021-02-20

International audience. As the dimensions and operating voltages of computer electronics shrink to cope with consumers' demand for higher performance and lower power consumption, circuit sensitivity to soft errors i...

Keyword Spotting System using Low-complexity Feature Extraction and Quantiz...

Archive ouverte: Communication dans un congrès

Hérissé, Kévin | 2021-11-28

International audience. Long Short-Term Memory (LSTM) neural networks offer state-of-the-art results to compute sequential data and address applications like keyword spotting. Mel Frequency Cepstral Coefficients (MF...

Improved Salp Swarm Optimization Algorithm: Application in Feature Weightin...

Archive ouverte: Article de revue

Ben Chaabane, Sarra | 2021-08

International audience. In modulation identification issues, like in any other classification problem, the performance of the classification task is significantly impacted by the feature characteristics. Feature wei...

[Review] Intelligent on-demand design of phononic metamaterials

Archive ouverte: Article de revue

Jin, Yabin | 2022-01-25

International audience. With the growing interest in the field of artificial materials, more advanced and sophisticated functionalities are required from phononic crystals and acoustic metamaterials. This implies a ...

Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine...

Archive ouverte: Communication dans un congrès

Alouani, Ihsen | 2022-08-31

International audience. Several systems and application domains are under-going disruptive transformations due to the recent breakthroughs in computing paradigms such us Machine Learning and commu-nication technolog...

Chargement des enrichissements...