The RRAM-based neuromorphic computing system has amassed explosive interests for its superior data processing capability and energy efficiency than traditional architectures, and thus being widely used in many data-centric applications. The reliability and security issues of the NCS therefore become an essential problem. In this paper, we systematically investigated the adversarial threats to the RRAM-based NCS and observed that the RRAM hardware feature can be leveraged to strengthen the attack effect, which has not been granted sufficient attention by previous algorithmic attack methods. Thus, we proposed two types of hardware-aware attack methods with respect to different attack scenarios and objectives. The first is adversarial attack, VADER, which perturbs the input samples to mislead the prediction of neural networks. The second is fault injection attack, EFI, which perturbs the network parameter space such that a specified sample will be classified to a target label, while maintaining the prediction accuracy on other samples. Both attack methods leverage the RRAM properties to improve the performance compared with the conventional attack methods. Experimental results show that our hardware-aware attack methods can achieve nearly 100% attack success rate with extremely low operational cost, while maintaining the attack stealthiness.
翻译:基于RRAM的神经形态计算系统与其传统的结构相比,其高级数据处理能力和能源效率引起了爆炸性利益,因此被广泛用于许多以数据为中心的应用中。因此,国家通信系统的可靠性和安全问题成为一个基本问题。在本文件中,我们系统地调查了对基于RRAM的NCS的对抗性威胁,发现RRAM硬件特性可以用来加强攻击效果,而以前算法攻击方法没有给予足够的注意。因此,我们建议了两种关于不同攻击情景和目标的硬件意识攻击方法。第一个是干扰输入样本以误导神经网络预测的对抗性攻击,VADER,第二个是错误注射攻击,EFI,它干扰网络参数空间,将特定样品归类为目标标签,同时保持其他样品的预测准确性。两种攻击方法都利用RRAM特性来提高与常规攻击方法相比的性能。实验结果显示,我们的硬件意识攻击方法能够以极低的操作成本达到近100%的攻击成功率,同时保持攻击的隐性。