Field-programmable gate arrays (FPGAs) are becoming widely used accelerators for a myriad of datacenter applications due to their flexibility and energy efficiency. Among these applications, FPGAs have shown promising results in accelerating low-latency real-time deep learning (DL) inference, which is becoming an indispensable component of many end-user applications. With the emerging research direction towards virtualized cloud FPGAs that can be shared by multiple users, the security aspect of FPGA-based DL accelerators requires careful consideration. In this work, we evaluate the security of DL accelerators against voltage-based integrity attacks in a multitenant FPGA scenario. We first demonstrate the feasibility of such attacks on a state-of-the-art Stratix 10 card using different attacker circuits that are logically and physically isolated in a separate attacker role, and cannot be flagged as malicious circuits by conventional bitstream checkers. We show that aggressive clock gating, an effective power-saving technique, can also be a potential security threat in modern FPGAs. Then, we carry out the attack on a DL accelerator running ImageNet classification in the victim role to evaluate the inherent resilience of DL models against timing faults induced by the adversary. We find that even when using the strongest attacker circuit, the prediction accuracy of the DL accelerator is not compromised when running at its safe operating frequency. Furthermore, we can achieve 1.18-1.31x higher inference performance by over-clocking the DL accelerator without affecting its prediction accuracy.
翻译:外地可编程门阵列(FPGAs)正在成为广泛使用的加速器,用于众多的数据中心应用。在这些应用中,FPGAs在加速低纬度实时深入学习(DL)推断方面展示了令人乐观的结果,这正在成为许多终端用户应用中不可或缺的组成部分。随着正在向虚拟化云阵列(可由多个用户共享)的研究方向发展,基于 FPGA 的 DL 加速器的安全方面需要仔细考虑。在这项工作中,我们评估DL 加速器在多强度FPGA情景下对基于电流的完整攻击的准确性能攻击的准确性能。我们首先展示了使用不同攻击器电路段进行这种攻击的可行性,这些电路段在逻辑上和物理上是孤立的,而且不能被常规点流检查器标记为恶意电路路段。我们通过攻击时,有效的节时节时节速技术也可能成为甚至现代FPCARC频率攻击的潜在安全性威胁。我们先在使用DFGA的精确性变压时,我们用内部的变压变压机进行这种变压机的变压。