To reduce the time-to-market and access to state-of-the-art techniques, CNN hardware mapping and deployment on embedded accelerators are often outsourced to untrusted third parties, which is going to be more prevalent in futuristic artificial intelligence of things (AIoT) systems. These AIoT systems anticipate horizontal collaboration among different resource-constrained AIoT node devices, where CNN layers are partitioned and these devices collaboratively compute complex CNN tasks. This horizontal collaboration opens another attack surface to the CNN-based application, like inserting the hardware Trojans (HT) into the embedded accelerators designed for the CNN. Therefore, there is a dire need to explore this attack surface for designing secure embedded hardware accelerators for CNNs. Towards this goal, in this paper, we exploited this attack surface to propose an HT-based attack called FeSHI. Since in horizontal collaboration of RC AIoT devices different sections of CNN architectures are outsourced to different untrusted third parties, the attacker may not know the input image, but it has access to the layer-by-layer output feature maps information for the assigned sections of the CNN architecture. This attack exploits the statistical distribution, i.e., Gaussian distribution, of the layer-by-layer feature maps of the CNN to design two triggers for stealthy HT with a very low probability of triggering. Also, three different novel, stealthy and effective trigger designs are proposed.
翻译:为了减少时间到市场和获得最新技术的机会,CNN硬件绘图和嵌入加速器的部署往往外包给不受信任的第三方,这将在东西的未来人工智能系统(AIoT)中更为普遍。这些AIOT系统预计不同资源限制的AIOT节点装置之间的横向合作,在这些装置中CNN层被分割,这些装置合作计算复杂的CNN任务。这种横向合作为CNN应用程序打开了另一个攻击面,如在为CNN设计的嵌入的加速器中插入硬件Trojans(HT)。因此,迫切需要探索这一攻击表面,为CNN设计安全嵌入的硬加速器(AIoT)系统。为了实现这一目标,我们利用这一攻击面提出以HT为基础的攻击,称为FESHI。由于在RC AYT的横向合作中,拟议的CNN结构的不同部分被外包给不同的不受信任的第三方,攻击者可能不知道输入图像,但是他们可以进入为CNN设计的嵌入式加速器加速加速器。这三部分是用于CNNNCN的层逐层指令结构图的频率结构图。