skip to main content
10.1145/3589737.3605964acmconferencesArticle/Chapter ViewAbstractPublication PagesiconsConference Proceedingsconference-collections
research-article

"S3cure": Scramble, Shuffle and Shambles - Secure Deployment of Weight Matrices in Memristor Crossbar Arrays

Published:28 August 2023Publication History

ABSTRACT

Crossbar arrays based on emerging memristor technology offer significant power savings when running Artificial Neural Network (ANN) applications. An additional advantage of this technology is its non-volatility, which eliminates the need for costly loading of a complete ANN model from conventional memories, thus saving power and allowing immediate system availability. However, this advantage can arguably be seen as a disadvantage from a security perspective, since the ANN model remains on the crossbar indefinitely and is therefore vulnerable to theft. On the other hand, a disadvantage of the current memristor technology is its significantly limited write endurance. Considering these two constraints, we propose a highly secure and yet simple deployment method: "S3cure", which does not require encryption of individual stored values in the memristor, thus avoiding rewriting after each decryption and also rendering useless any unwanted extraction of the ANN model from the crossbar. In our proposed methodology, the ANN model is permuted before deployment by multiplying the model weight matrices with permutation matrices, and the inverse permutation vectors of these matrices become the access key needed at runtime to correctly exploit the model. The analysis and testing of our "S3cure" method reveals extremely difficult brute-force reverse engineering, proportional to the key size, and also shows a limited one-time performance overhead incurred by this implementation.

References

  1. David Patterson Krste Asanovic Andrew Waterman, Yunsup Lee. 2014. The RISCV Instruction Set Manual, Volume I: User-Level ISA, Version 2.0. Technical Report UCB/EECS-2014-54. EECS Department, University of California, Berkeley.Google ScholarGoogle Scholar
  2. Ali BanaGozar, Kanishkan Vadivel, Sander Stuijk, Henk Corporaal, Stephan Wong, Muath Abu Lebdeh, Jintao Yu, and Said Hamdioui. 2019. CIM-SIM: Computation In Memory SIMuIator (SCOPES '19). Association for Computing Machinery, New York, NY, USA, 1--4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Yi Cai, Xiaoming Chen, Lu Tian, Yu Wang, and Huazhong Yang. 2019. Enabling Secure in-Memory Neural Network Computing by Sparse Fast Gradient Encryption. In 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 1--8. Google ScholarGoogle ScholarCross RefCross Ref
  4. Siddhartha Chhabra and Yan Solihin. 2011. i-NVMM: A secure non-volatile main memory system with incremental encryption. In 2011 38th Annual International Symposium on Computer Architecture (ISCA). 177--188. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Joseph Clements and Yingjie Lao. 2019. Hardware Trojan Design on Neural Networks. In 2019 IEEE International Symposium on Circuits and Systems (ISCAS). 1--5. Google ScholarGoogle ScholarCross RefCross Ref
  6. Li Deng. 2012. The mnist database of handwritten digit images for machine learning research. IEEE Signal Processing Magazine 29, 6 (2012), 141--142.Google ScholarGoogle ScholarCross RefCross Ref
  7. Melvin Galicia, Ali BanaGozar, Karl Sturm, Felix Staudigl, Sander Stuijk, Henk Corporaal, and Rainer Leupers. 2021. NeuroVP: A System-Level Virtual Platform for Integration of Neuromorphic Accelerators. In 2021 IEEE 34th International System-on-Chip Conference (SOCC). 236--241. Google ScholarGoogle ScholarCross RefCross Ref
  8. Zimu Guo, Mark M. Tehranipoor, and Domenic Forte. 2016. Aging attacks for key extraction on permutation-based obfuscation. In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST). 1--6. Google ScholarGoogle ScholarCross RefCross Ref
  9. Vladimir Herdt, Daniel Große, Pascal Pieper, and Rolf Drechsler. 2020. RISC-V based virtual prototype: An extensible and configurable platform for the system-level. Journal of Systems Architecture 109 (2020), 101756. Google ScholarGoogle ScholarCross RefCross Ref
  10. Sachhidh Kannan, Naghmeh Karimi, Ozgur Sinanoglu, and Ramesh Karri. 2015. Security Vulnerabilities of Emerging Nonvolatile Main Memories and Counter-measures. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34, 1 (2015), 2--15. Google ScholarGoogle ScholarCross RefCross Ref
  11. Lauri Koskinen, Jari Tissari, Jukka Teittinen, Eero Lehtonen, Mika Laiho, and Jussi H. Poikonen. 2016. A Performance Case-Study on Memristive Computing-in-Memory Versus Von Neumann Architecture. In 2016 Data Compression Conference (DCC). 613--613. Google ScholarGoogle ScholarCross RefCross Ref
  12. Jung-Hoon Lee, Dong-Hyeok Lim, Hongsik Jeong, Huimin Ma, and Luping Shi. 2019. Exploring Cycle-to-Cycle and Device-to-Device Variation Tolerance in MLC Storage-Based Neural Network Training. IEEE Transactions on Electron Devices 66, 5 (2019), 2172--2178. Google ScholarGoogle ScholarCross RefCross Ref
  13. Zeba Nasim, Zohra Bano, and Musheer Ahmad. 2015. Analysis of efficient random permutations generation for security applications. In 2015 International Conference on Advances in Computer Engineering and Applications. 337--341. Google ScholarGoogle ScholarCross RefCross Ref
  14. Fabiha Nowshin and Yang Yi. 2022. Memristor-based Deep Spiking Neural Network with a Computing-In-Memory Architecture. In 2022 23rd International Symposium on Quality Electronic Design (ISQED). 1--6. Google ScholarGoogle ScholarCross RefCross Ref
  15. Yuhang Wang, Song Jin, and Tao Li. 2021. A Low Cost Weight Obfuscation Scheme for Security Enhancement of ReRAM Based Neural Network Accelerators. In 2021 26th Asia and South Pacific Design Automation Conference (ASP-DAC). 499--504.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Lingxiao Wei, Bo Luo, Yu Li, Yannan Liu, and Qiang Xu. 2018. I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators. In Proceedings of the 34th Annual Computer Security Applications Conference (San Juan, PR, USA) (ACSAC '18). Association for Computing Machinery, New York, NY, USA, 393--406. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Di Wu, Xitian Fan, Wei Cao, and Lingli Wang. 2021. SWM: A High-Performance Sparse-Winograd Matrix Multiplication CNN Accelerator. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29, 5 (2021), 936--949. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Minhui Zou, Junlong Zhou, Xiaotong Cui, Wei Wang, and Shahar Kvatinsky. 2022. Enhancing Security of Memristor Computing System Through Secure Weight Mapping. In 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). 182--187. Google ScholarGoogle ScholarCross RefCross Ref
  19. Minhui Zou, Zhenhua Zhu, Yi Cai, Junlong Zhou, Chengliang Wang, and Yu Wang. 2020. Security Enhancement for RRAM Computing System through Obfuscating Crossbar Row Connections. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE). 466--471. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. "S3cure": Scramble, Shuffle and Shambles - Secure Deployment of Weight Matrices in Memristor Crossbar Arrays

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              ICONS '23: Proceedings of the 2023 International Conference on Neuromorphic Systems
              August 2023
              270 pages
              ISBN:9798400701757
              DOI:10.1145/3589737

              Copyright © 2023 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 28 August 2023

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate13of22submissions,59%

              Upcoming Conference

              ICONS '24
              International Conference on Neuromorphic Systems
              July 30 - August 2, 2024
              Arlington , VA , USA
            • Article Metrics

              • Downloads (Last 12 months)50
              • Downloads (Last 6 weeks)6

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader