- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources3
- Resource Type
-
01000020000
- More
- Availability
-
30
- Author / Contributor
- Filter by Author / Creator
-
-
Merkel, Cory (3)
-
Dhakal, Prashant (1)
-
Herrmann, Eric (1)
-
Hou, Aolin (1)
-
Jacob, Ajey P. (1)
-
Jha, Rashmi (1)
-
Jones, Alexander (1)
-
Kim, Jae Gwang (1)
-
Li, Wei (1)
-
Liu, Dongfang (1)
-
Liu, Ruochen (1)
-
Ma, Jun (1)
-
Qiu, Jingjing (1)
-
Rush, Andrew (1)
-
Thiem, Clare (1)
-
Wang, Shiren (1)
-
Xu, Hongye (1)
-
Zoran, Mark (1)
-
Zuzak, Michael (1)
-
#Tyler Phillips, Kenneth E. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Logic locking has been proposed to safeguard intellectual property (IP) during chip fabrication. Logic locking techniques protect hardware IP by making a subset of combinational modules in a design dependent on a secret key that is withheld from untrusted parties. If an incorrect secret key is used, a set of deterministic errors is produced in locked modules, restricting unauthorized use. A common target for logic locking is neural accelerators, especially as machine-learning-as-a-service becomes more prevalent. In this work, we explore how logic locking can be used to compromise the security of a neural accelerator it protects. Specifically, we show how the deterministic errors caused by incorrect keys can be harnessed to produce neural-trojan-style backdoors. To do so, we first outline a motivational attack scenario where a carefully chosen incorrect key, which we call a trojan key, produces misclassifications for an attacker-specified input class in a locked accelerator. We then develop a theoretically-robust attack methodology to automatically identify trojan keys. To evaluate this attack, we launch it on several locked accelerators. In our largest benchmark accelerator, our attack identified a trojan key that caused a 74% decrease in classification accuracy for attacker-specified trigger inputs, while degrading accuracy by only 1.7% for other inputs on average.more » « less
-
Liu, Ruochen ; Kim, Jae Gwang ; Dhakal, Prashant ; Li, Wei ; Ma, Jun ; Hou, Aolin ; Merkel, Cory ; Qiu, Jingjing ; Zoran, Mark ; Wang, Shiren ( , Advanced Composites and Hybrid Materials)
-
Jones, Alexander ; Rush, Andrew ; Merkel, Cory ; Herrmann, Eric ; Jacob, Ajey P. ; Thiem, Clare ; Jha, Rashmi ( , Neurocomputing)