In-memory computing (IMC) systems have great potential for accelerating data-intensive tasks such as deep neural networks (DNNs). As DNN models are generally highly proprietary, the neural network architectures become valuable targets for attacks. In IMC systems, since the whole model is mapped on chip and weight memory read can be restricted, the system acts as a "black box" for customers. However, the localized and stationary weight and data patterns may subject IMC systems to other attacks. In this paper, we propose a side-channel attack methodology on IMC architectures. We show that it is possible to extract model architectural information from power trace measurements without any prior knowledge of the neural network. We first developed a simulation framework that can emulate the dynamic power traces of the IMC macros. We then performed side-channel attacks to extract information such as the stored layer type, layer sequence, output channel/feature size and convolution kernel size from power traces of the IMC macros. Based on the extracted information, full networks can potentially be reconstructed without any knowledge of the neural network. Finally, we discuss potential countermeasures for building IMC systems that offer resistance to these model extraction attack.
翻译:模拟计算(IMC)系统在加速诸如深神经网络(DNN)等数据密集型任务方面具有巨大的潜力。由于DNN模型一般是高度专有的,神经网络结构成为攻击的有价值的目标。在IMC系统中,由于整个模型是在芯片上绘制的,重量内存读可以受到限制,因此系统作为客户的“黑盒子”作用。然而,本地和固定的重量和数据模式可能会使IMC系统受到其他攻击。在本文中,我们提议对IMC结构采用侧道攻击方法。我们表明,有可能从电动跟踪测量中提取模型建筑信息,而不必事先了解神经网络。我们首先开发了一个模拟框架,可以模仿IMC宏的动态能量痕迹。我们随后进行了侧道攻击,从存储层类型、层序列、输出通道/速度和内核电流大小等信息中提取信息。我们根据提取的信息,有可能在不了解神经网络任何模型的情况下对全网进行重建。我们讨论这些系统的潜在抗力。我们随后为建立这些抗力的IMC系统进行提取。