Lightning: Leveraging DVFS-induced Transient Fault Injection to Attack Deep Learning Accelerator of GPUs

نویسندگان

چکیده

Graphics Processing Units(GPU) are widely used as deep learning accelerators because of its high performance and low power consumption. Additionally, it remains secure against hardware-induced transient fault injection attacks, a classic type attacks that have been developed on other computing platforms. In this work, we demonstrate well-trained machine models robust hardware when the faults generated randomly. However, discover these components, which refer to sensitive targets, vulnerable faults. By exploiting vulnerability, propose Lightning attack, precisely strikes model’s targets with based Dynamic Voltage Frequency Scaling (DVFS). We design search algorithm find most critical processing units Deep Neural Network(DNN) determining inference results, develop genetic automatically optimize attack parameters for DVFS induce Experiments three commodity Nvidia GPUs four widely-used DNN show proposed can reduce accuracy by 69.1% average non-targeted and, more interestingly, achieve success rate 67.9% targeted attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

differentiation of true transient ischemic attack versus transient ischemic attack mimics.

background: previous literatures have shown a transient ischemic attack  (tia) mimic rate  of 9-31%. we aimed  to ascertain the proportion of stroke mimics amongst suspected tia patients. methods: a prospective observational study was performed in   ghaem   hospital,   mashhad,   iran   during   2012-2013. consecutive tia patients  were identified in a stroke center. the  initial diagnosis  of ...

متن کامل

GRIM: Leveraging GPUs for Kernel Integrity Monitoring

Kernel rootkits can exploit an operating system and enable future accessibility and control, despite all recent advances in software protection. A promising defense mechanism against rootkits is Kernel Integrity Monitor (KIM) systems, which inspect the kernel text and data to discover any malicious changes. A KIM can be implemented either in software, using a hypervisor, or using extra hardware...

متن کامل

Fault Table Computation on GPUs

In this paper, we explore the implementation of fault table generation on a Graphics Processing Unit (GPU). A fault table is essential for fault diagnosis and fault detection in VLSI testing and debug. Generating a fault table requires extensive fault simulation, with no fault dropping, and is extremely expensive from a computational standpoint. Fault simulation is inherently parallelizable, an...

متن کامل

Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms - A Tutorial

Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems interacting with sensitive data of personal or critical nature. This tutorial addresses this issue o...

متن کامل

Mitigation of Transient Overvoltages Generated Due to Switching Operations and Lightning in Gas-insulated Substation (GIS) Without Extra Limiter

Gas-insulated substations (GIS) have different specifications in proportion to air-insulated substations. Transformer failures related to lightning and switching are often reported in the gas insulated substation (GIS). This problem is the voltage magnifications due to reflections of switching and lightning surges at various junctions within the GIS. thereby overvoltages in GIS are more importa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Design Automation of Electronic Systems

سال: 2023

ISSN: ['1084-4309', '1557-7309']

DOI: https://doi.org/10.1145/3617893