skip to main content
10.1145/3386263.3406955acmotherconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

HTcatcher: Finite State Machine and Feature Verifcation for Large-scale Neuromorphic Computing Systems

Published:07 September 2020Publication History

ABSTRACT

Recent advances in resistive synaptic devices have enabled the emergence of brain-inspired smart chips. These chips can execute complex cognitive tasks in digital signal processing precisely and efficiently using an efficient neuromorphic system. The neuromorphic synapses used in such chips, however, are very sensitive to the external environment, thereby weakening their resistance to malicious modifications such as hardware Trojans and backdoors. Accordingly, in this paper, we propose HTcatcher, a security verification technique for hardware threat detection in neuromorphic computing systems, incorporating finite state machine and feature verification simultaneously, which has never been considered in prior work. Furthermore, we propose a pseudo-random matrix verifying technique for memory optimization, which can reduce the memory overhead of the multi-dimensional features in the system significantly. Experimental results confirm that the proposed method can identify the malicious modifications in the system accurately, while reducing the memory usage by 25%-50%.

Skip Supplemental Material Section

Supplemental Material

3386263.3406955.mp4

mp4

8.8 MB

References

  1. D. S. Modha. Neuromorphic and synaptronic spiking neural network with synaptic weights learned using simulation. U.S. Patent, 8,515,885, 2013--8--20.Google ScholarGoogle Scholar
  2. P. Yao, H. Wu, B. Gao, et al. Face classification using electronic synapses. Nature Communications., vol. 8, no. 15199, doi: 10.1038/ncomms151992017, 2017.Google ScholarGoogle Scholar
  3. Jiang Y, Huang P, Zhu D, et al. Design and hardware implementation of neuromorphic systems with RRAM synapses and threshold-controlled neurons for pattern recognition. IEEE Transactions on Circuits and Systems I, vol. 65, no. 9, pp. 2726--2738, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  4. Ielmini, Daniele. Brain-inspired computing with resistive switching memory (RRAM): Devices, synapses and neural networks. Microelectronic Engineering., vol. 190, pp. 44--53, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Yu, Y. Wu, et al. An electronic synapse device based on metal oxide resistive switching memory for neuromorphic computation. IEEE Trans on Electron Devices, vol. 58, no. 8, pp. 2729--2737, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  6. R. C. Rodrigo, L. Javier and G. Stefanos. Evolution and trends in IoT security. Computer, vol. 51, no. 7, pp. 16--25, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  7. M. Li, B. Yu, Y. Lin, et al. A practical split manufacturing framework for Trojan prevention via simultaneous wire lifting and cell insertion. proc. of ASP-DAC, 2018, pp. 256--270.Google ScholarGoogle ScholarCross RefCross Ref
  8. Beringuierboher N, Lacruche M, Elbaze D, et al. Body biasing injection attacks in practice. Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016, pp. 49--54.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Yang K, Hicks M, Dong Q, et al. Exploiting the analog properties of digital circuits for malicious hardware. Communications of the ACM, vol. 60, no. 9, pp. 83--91, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. N. Beringuier-Boher, H. David, V. Beroulle, et al. Increasing the security level of analog IPs by using a dedicated vulnerability analysis methodology. proc. of ISQED, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  11. Hassan Salmani. COTD: reference-free hardware Trojan detection and recovery based on controllability and observability in gate-level Netlist. IEEE Transactions on Information Forensics & Security, vol. 12, no. 2, pp. 338--350, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Liu, C. Yang, H. Li, et al. Security of neuromorphic systems: challenges and solutions. proc. of ISCAS, 2016, pp. 1326--1329.Google ScholarGoogle ScholarCross RefCross Ref
  13. L. X. Xia, et al. Fault-tolerant training enabled by on-line fault detection for RRAM-based neural computing systems. IEEE Trans on Computer-Aided Design of Integrated Circuits and Systems., 2018.Google ScholarGoogle Scholar
  14. S. Zhang, G. L. Zhang, B. Li, H. H. Li and U. Schlichtmann. Aging-aware lifetime enhancement for memristor-based neuromorphic computing. proc. of DATE, 2019, pp. 1751--1756.Google ScholarGoogle ScholarCross RefCross Ref
  15. Y. Zhu, G. L. Zhang, T. Wan, B. Li, Y. Shi, T.-Y. Ho and U. Schlichtmann. Statistical training for neuromorphic computing using memristor-based crossbars considering process variations and noise. proc. of DATE, 2020Google ScholarGoogle ScholarCross RefCross Ref
  16. Dong C, Zhang F, Liu X, et al. A locating method for multi-purposes HTs based on the boundary network. IEEE Access, vol.7, pp. 110936--110950, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  17. Q. Liu, T. Liu, Z. Liu, et al. Security analysis and enhancement of model compressed deep learning systems under adversarial attacks. proc. of ASP-DAC, 2018, pp. 721--7Google ScholarGoogle ScholarCross RefCross Ref
  18. A. Sengupta, D. Roy, S. P. Mohanty. Triple-phase watermarking for reusable IP core protection during architecture synthesis. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems., vol. 37, no. 4, pp. 742--755, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Magana, D. Shi, J. Melchert, et al. Are proximity attacks a threat to the security of split manufacturing of integrated circuits?IEEE Transactions on Very Large Scale Integration (VLSI) Systems., vol. 25, no. 12, pp. 3406--3419, 2017.Google ScholarGoogle Scholar
  20. M. Oya, N. Yamashita, T. Okamura, et al. Hardware-trojans rank: quantitative evaluation of security threats at gate-level netlists by pattern matching. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,vol. E99, no. A(12), pp. 2335--2347, 2016.Google ScholarGoogle Scholar
  21. H. Ding, J. Wang and J. Zhong. Temperature-variation based hardware trojan detection through ring oscillator. Electronics Letters, vol. 52, no. 15, pp. 1302--1304, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  22. Hassan Salmani. Hardware trojans in analog and mixed-signal integrated circuits. Trusted Digital Circuits, pp. 121--131. Springer, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  23. R. S. Chakraborty, S. Pagliarini, J. Mathew, et al. A flexible online checking technique to enhance hardware trojan horse detectability by reliability analysis. IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 2, pp. 260--270, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  24. A. V. Karthik, et al. ABCD-NL: Approximating continuous non-linear dynamical systems using purely boolean models for analog/mixed-signal verification. proc. of ASP-DAC, 2014, pp. 250--255.Google ScholarGoogle ScholarCross RefCross Ref
  25. Karthik A V, et al. ABCD-L: Approximating continuous linear systems using Boolean models. proc. of DAC, 2013, pp. 1--9.Google ScholarGoogle Scholar
  26. M. Bidmeshki, A. Antonopoulos, Y. Makris. Information flow tracking in analog/mixed-signal designs through proof-carrying hardware IP. proc. of DATE, 2017, pp. 1703--1708.Google ScholarGoogle ScholarCross RefCross Ref
  27. K. Yang, M. Hicks, Q. Dong, et al. A2: Analog malicious hardware. proc. of SP, 2016, pp. 18--37.Google ScholarGoogle ScholarCross RefCross Ref
  28. Hashemi S, Tann H, Reda S. BLASYS: Approximate logic synthesis using boolean matrix factorization. proc. of DAC, 2018, pp. 1--6.Google ScholarGoogle Scholar

Index Terms

  1. HTcatcher: Finite State Machine and Feature Verifcation for Large-scale Neuromorphic Computing Systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          GLSVLSI '20: Proceedings of the 2020 on Great Lakes Symposium on VLSI
          September 2020
          597 pages
          ISBN:9781450379441
          DOI:10.1145/3386263

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 September 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate312of1,156submissions,27%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader