Author:
Zou Minhui,Du Nan,Kvatinsky Shahar
Abstract
Neural network (NN) algorithms have become the dominant tool in visual object recognition, natural language processing, and robotics. To enhance the computational efficiency of these algorithms, in comparison to the traditional von Neuman computing architectures, researchers have been focusing on memristor computing systems. A major drawback when using memristor computing systems today is that, in the artificial intelligence (AI) era, well-trained NN models are intellectual property and, when loaded in the memristor computing systems, face theft threats, especially when running in edge devices. An adversary may steal the well-trained NN models through advanced attacks such as learning attacks and side-channel analysis. In this paper, we review different security techniques for protecting memristor computing systems. Two threat models are described based on their assumptions regarding the adversary’s capabilities: a black-box (BB) model and a white-box (WB) model. We categorize the existing security techniques into five classes in the context of these threat models: thwarting learning attacks (BB), thwarting side-channel attacks (BB), NN model encryption (WB), NN weight transformation (WB), and fingerprint embedding (WB). We also present a cross-comparison of the limitations of the security techniques. This paper could serve as an aid when designing secure memristor computing systems.
Funder
Framework Programme
Deutsche Forschungsgemeinschaft
Reference51 articles.
1. Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers;Awad;SIGPLAN Not.,2016
2. Triad-nvm: Persistency for integrity-protected and encrypted non-volatile memories;Awad,2019
3. CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel;Batina,2019
4. Language models are few-shot learners;Brown;Adv. neural Inf. Process. Syst.,2020
5. Enabling secure in-memory neural network computing by sparse fast gradient encryption;Cai
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献