Stealthy and Robust Glitch Injection Attack on Deep Learning Accelerator for Target With Variational Viewpoint
نویسندگان
چکیده
Deep neural network (DNN) accelerators overcome the power and memory walls for executing neural-net models locally on edge-computing devices to support sophisticated AI applications. The advocacy of “model once, run optimized anywhere” paradigm introduces potential new security threat edge intelligence that is methodologically different from well-known adversarial examples. Existing examples modify input samples presented an application either digitally or physically cause a misclassification. Nevertheless, these input-based perturbations are not robust surreptitious multi-view target. To generate good example misclassifying real-world target variational viewing angle, lighting distance, decent number target’s required extract rare anomalies can cross decision boundary. feasible substantial visually perceptible. In this paper, we propose glitch injection attack DNN accelerator capable under viewpoints. glitches injected into computation clock signal induce transitory but disruptive errors in intermediate results multiply-and-accumulate (MAC) operations. pattern each interest consists sparse instantaneous glitches, which be derived just one sample Two modes patterns derived, their effectiveness demonstrated four representative ImageNet implemented Deep-learning Processing Unit (DPU) FPGA its development toolchain. success rates evaluated 118 objects 61 diverse sensing conditions, including 25 angles (−60° 60°), 24 illumination directions 12 color temperatures. covert mode, our exceed existing stealthy by more than 16.3%, with only two ten thousands million cycles complete inference. all DNNs 96.2% average intensity 1.4% maximum 10.2%.
منابع مشابه
Glitch Classification and Clustering for LIGO with Deep Transfer Learning
The detection of gravitational waves with LIGO and Virgo requires a detailed understanding of the response of these instruments in the presence of environmental and instrumental noise. Of particular interest is the study of anomalous nonGaussian noise transients known as glitches, since their high occurrence rate in LIGO/Virgo data can obscure or even mimic true gravitational wave signals. Ther...
متن کاملOn Modern Deep Learning and Variational Inference
Bayesian modelling and variational inference are rooted in Bayesian statistics, and easily benefit from the vast literature in the field. In contrast, deep learning lacks a solid mathematical grounding. Instead, empirical developments in deep learning are often justified by metaphors, evading the unexplained principles at play. It is perhaps astonishing then that most modern deep learning model...
متن کاملDeep Transfer Learning: A new deep learning glitch classification method for advanced LIGO
The exquisite sensitivity of the advanced LIGO detectors has enabled the detection of multiple gravitational wave signals, thereby establishing gravitational wave astrophysics as an active field of research. The sophisticated design of these detectors mitigates the effect of most types of noise. However, advanced LIGO data streams are contaminated by numerous artifacts known as glitches — non-G...
متن کاملStochastic Variational Deep Kernel Learning
Deep kernel learning combines the non-parametric flexibility of kernel methods with the inductive biases of deep learning architectures. We propose a novel deep kernel learning model and stochastic variational inference procedure which generalizes deep kernel learning approaches to enable classification, multi-task learning, additive covariance structures, and stochastic gradient training. Spec...
متن کاملVariational Networks: Connecting Variational Methods and Deep Learning
In this paper, we introduce variational networks (VNs) for image reconstruction. VNs are fully learned models based on the framework of incremental proximal gradient methods. They provide a natural transition between classical variational methods and state-of-the-art residual neural networks. Due to their incremental nature, VNs are very efficient, but only approximately minimize the underlying...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2021
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2020.3046858