论文标题

电源侧通道攻击远程FPGA中BNN加速器的攻击

Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs

论文作者

Moini, Shayan, Tian, Shanquan, Szefer, Jakub, Holcomb, Daniel, Tessier, Russell

论文摘要

为了降低成本并增加云现场可编程门阵列(FPGA)的利用,研究人员最近一直在探索多租户FPGA的概念,其中多个独立用户同时共享相同的远程FPGA。尽管有好处,但多租户还是开辟了恶意用户与受害者用户同一FPGA共处的可能性,并提取敏感信息。当用户运行正在处理敏感或私人信息的机器学习算法时,此问题变得尤为严重。为了证明危险,本文对在各种Xilinx FPGA中运行的深神经网络加速器以及使用Amazon Web Services(AWS)F1实例进行了对深神经网络加速器的远程侧道攻击。这项工作尤其表明了如何作为深神经网络推断电路的远程获得电压估计,以及如何使用信息来恢复对神经网络的输入。该攻击是通过用于从MNIST手写数字数据库中识别手写图像的二进制卷积神经网络证明的。通过使用精确的时间数量转换器进行远程电压估计,可以在输入图像和本地FPGA板上的最大归一化交叉相关中成功恢复MNIST输入,而在本地FPGA板上恢复的图像和AWS F1实例的72%。攻击不需要物理访问或对FPGA硬件的修改。

To lower cost and increase the utilization of Cloud Field-Programmable Gate Arrays (FPGAs), researchers have recently been exploring the concept of multi-tenant FPGAs, where multiple independent users simultaneously share the same remote FPGA. Despite its benefits, multi-tenancy opens up the possibility of malicious users co-locating on the same FPGA as a victim user, and extracting sensitive information. This issue becomes especially serious when the user is running a machine learning algorithm that is processing sensitive or private information. To demonstrate the dangers, this paper presents a remote, power-based side-channel attack on a deep neural network accelerator running in a variety of Xilinx FPGAs and also on Cloud FPGAs using Amazon Web Services (AWS) F1 instances. This work in particular shows how to remotely obtain voltage estimates as a deep neural network inference circuit executes, and how the information can be used to recover the inputs to the neural network. The attack is demonstrated with a binarized convolutional neural network used to recognize handwriting images from the MNIST handwritten digit database. With the use of precise time-to-digital converters for remote voltage estimation, the MNIST inputs can be successfully recovered with a maximum normalized cross-correlation of 79% between the input image and the recovered image on local FPGA boards and 72% on AWS F1 instances. The attack requires no physical access nor modifications to the FPGA hardware.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源