With proliferation of DNN-based applications, the confidentiality of DNN model is an important commercial goal. Spatial accelerators, that parallelize matrix/vector operations, are utilized for enhancing energy efficiency of DNN computation. Recently, model extraction attacks on simple accelerators, either with a single processing element or running a binarized network, were demonstrated using the methodology derived from differential power analysis (DPA) attack on cryptographic devices. This paper investigates the vulnerability of realistic spatial accelerators using general, 8-bit, number representation. We investigate two systolic array architectures with weight-stationary dataflow: (1) a 3 $\times$ 1 array for a dot-product operation, and (2) a 3 $\times$ 3 array for matrix-vector multiplication. Both are implemented on the SAKURA-G FPGA board. We show that both architectures are ultimately vulnerable. A conventional DPA succeeds fully on the 1D array, requiring 20K power measurements. However, the 2D array exhibits higher security even with 460K traces. We show that this is because the 2D array intrinsically entails multiple MACs simultaneously dependent on the same input. However, we find that a novel template-based DPA with multiple profiling phases is able to fully break the 2D array with only 40K traces. Corresponding countermeasures need to be investigated for spatial DNN accelerators.
翻译:以 DNN 为基础的应用程序扩散, DNN 模型的保密性是一个重要的商业目标。 空间加速器, 即同时使用矩阵/ 矢量操作, 用来提高 DNN 计算中的能源效率。 最近, 使用不同功率分析(DPA) 攻击加密装置的方法, 演示了对简单加速器的抽取攻击, 使用单一处理元件或运行一个二进制网络。 本文调查现实空间加速器的脆弱性, 使用通用的, 8位数表示法, 数字表示法 。 但是, 我们调查了两个带有重静态数据流的同步阵列结构:(1) 3 $\ 1 阵列用于 dot 产品操作, 和 (2) 3 美元 3 调时制加速器的抽取攻击, 使用单一处理元件元, 或运行一个二进制的网络。 这两种系统都是在SAK URA G FPGA 板块上执行的。 我们显示这两种结构最终都很脆弱。 常规的DADA 完全成功在 1D 阵列阵列上, 需要20K 。 但是, 2D 显示, 显示这个阵列只能同时使用多进式的阵列。