当前位置: X-MOL 学术ACM Trans. Des. Autom. Electron. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Security Threat Analyses and Attack Models for Approximate Computing Systems
ACM Transactions on Design Automation of Electronic Systems ( IF 1.4 ) Pub Date : 2021-04-23 , DOI: 10.1145/3442380
Pruthvy Yellu 1 , Landon Buell 1 , Miguel Mark 2 , Michel A. Kinsy 2 , Dongpeng Xu 1 , Qiaoyan Yu 1
Affiliation  

Approximate computing (AC) represents a paradigm shift from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy. The rapid progress on the development of diverse AC techniques allows us to apply approximate computing to many computation-intensive applications. However, the utilization of AC techniques could bring in new unique security threats to computing systems. This work does a survey on existing circuit-, architecture-, and compiler-level approximate mechanisms/algorithms, with special emphasis on potential security vulnerabilities. Qualitative and quantitative analyses are performed to assess the impact of the new security threats on AC systems. Moreover, this work proposes four unique visionary attack models, which systematically cover the attacks that build covert channels, compensate approximation errors, terminate normal error resilience mechanisms, and propagate additional errors. To thwart those attacks, this work further offers the guideline of countermeasure designs. Several case studies are provided to illustrate the implementation of the suggested countermeasures.

中文翻译:

近似计算系统的安全威胁分析和攻击模型

近似计算(AC)代表了从传统精确处理到不精确计算的范式转变,但仍满足系统对准确性的要求。各种 AC 技术的快速发展使我们能够将近似计算应用于许多计算密集型应用程序。然而,AC 技术的使用可能会给计算系统带来新的独特安全威胁。这项工作对现有的电路、架构和编译器级别的近似机制/算法进行了调查,特别强调了潜在的安全漏洞。进行定性和定量分析以评估新的安全威胁对空调系统的影响。此外,这项工作提出了四种独特的有远见的攻击模型,它们系统地涵盖了建立隐蔽通道的攻击,补偿近似误差,终止正常的误差恢复机制,并传播额外的误差。为了阻止这些攻击,这项工作进一步提供了对策设计的指导方针。提供了几个案例研究来说明建议的对策的实施。
更新日期:2021-04-23
down
wechat
bug