FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack

Convolutional Neural Networks (CNN) have shown impressive performance in computer vision, natural language processing, and many other applications, but they exhibit high computations and substantial memory requirements. To address these limitations, especially in resource-constrained devices, the us...

Full description

Bibliographic Details
Main Authors: Tolulope A. Odetola, Faiq Khalid, Hawzhin Mohammed, Travis C. Sandefur, Syed Rafay Hasan
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9514588/
_version_ 1818677151927369728
author Tolulope A. Odetola
Faiq Khalid
Hawzhin Mohammed
Travis C. Sandefur
Syed Rafay Hasan
author_facet Tolulope A. Odetola
Faiq Khalid
Hawzhin Mohammed
Travis C. Sandefur
Syed Rafay Hasan
author_sort Tolulope A. Odetola
collection DOAJ
description Convolutional Neural Networks (CNN) have shown impressive performance in computer vision, natural language processing, and many other applications, but they exhibit high computations and substantial memory requirements. To address these limitations, especially in resource-constrained devices, the use of cloud computing for CNNs is becoming more popular. This comes with privacy and latency concerns that have motivated the designers to develop embedded hardware accelerators for CNNs. However, designing a specialized accelerator increases the time-to-market and cost of production. Therefore, to reduce the time-to-market and access to state-of-the-art techniques, CNN hardware mapping and deployment on embedded accelerators are often outsourced to untrusted third parties, which is going to be more prevalent in futuristic artificial intelligence of things (AIoT) systems. These AIoT systems anticipates horizontal collaboration among different resource constrained AIoT node devices, where CNN layers are partitioned and these devices collaboratively compute complex CNN tasks. This horizontal collaboration opens another attack surface to the CNN-based application, like inserting the hardware Trojans (HT) into the embedded accelerators designed for the CNN. Therefore, there is a dire need to explore this attack surface for designing the secure embedded hardware accelerators for CNNs. Towards this goal, in this paper, we exploited this attack surface to propose an HT-based attack called FeSHI. Since in horizontal collaboration of RC AIoT devices different sections of CNN architectures are outsourced to different untrusted third parties, the attacker may not know the input image, but it has access to the layer-by-layer output feature maps information for the assigned sections of the CNN architecture. This attack exploits the statistical distribution, i.e., Gaussian distribution, of the layer-by-layer feature maps of the CNN to design two triggers for stealthy HT with a very low probability of triggering. Also three different novel, stealthy and effective trigger designs are proposed. To illustrate the effectiveness of the proposed attack, we deployed the LeNet and LeNet-3D on PYNQ to classify the MNIST and CIFAR-10 datasets, respectively, and tested FeSHI. The experimental results show that FeSHI utilizes up to 2% extra LUTs, and the overall resource overhead is less than 1% compared to the original designs. It is also demonstrated on the PYNQ board that FeSHI triggers the attack vary randomly making it extremely difficult to detect.
first_indexed 2024-12-17T08:54:49Z
format Article
id doaj.art-829ea904532f4b6fa64a4ef46283d46e
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-17T08:54:49Z
publishDate 2021-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-829ea904532f4b6fa64a4ef46283d46e2022-12-21T21:55:58ZengIEEEIEEE Access2169-35362021-01-01911537011538710.1109/ACCESS.2021.31045209514588FeSHI: Feature Map-Based Stealthy Hardware Intrinsic AttackTolulope A. Odetola0Faiq Khalid1https://orcid.org/0000-0001-6263-674XHawzhin Mohammed2Travis C. Sandefur3Syed Rafay Hasan4https://orcid.org/0000-0003-0183-8086Department of Electrical and Computer Engineering, Tennessee Tech University, Cookeville, TN, USADepartment of Computer Engineering, Technische Universität Wien (TU Wien), Vienna, AustriaDepartment of Electrical and Computer Engineering, Tennessee Tech University, Cookeville, TN, USADepartment of Electrical and Computer Engineering, Tennessee Tech University, Cookeville, TN, USADepartment of Electrical and Computer Engineering, Tennessee Tech University, Cookeville, TN, USAConvolutional Neural Networks (CNN) have shown impressive performance in computer vision, natural language processing, and many other applications, but they exhibit high computations and substantial memory requirements. To address these limitations, especially in resource-constrained devices, the use of cloud computing for CNNs is becoming more popular. This comes with privacy and latency concerns that have motivated the designers to develop embedded hardware accelerators for CNNs. However, designing a specialized accelerator increases the time-to-market and cost of production. Therefore, to reduce the time-to-market and access to state-of-the-art techniques, CNN hardware mapping and deployment on embedded accelerators are often outsourced to untrusted third parties, which is going to be more prevalent in futuristic artificial intelligence of things (AIoT) systems. These AIoT systems anticipates horizontal collaboration among different resource constrained AIoT node devices, where CNN layers are partitioned and these devices collaboratively compute complex CNN tasks. This horizontal collaboration opens another attack surface to the CNN-based application, like inserting the hardware Trojans (HT) into the embedded accelerators designed for the CNN. Therefore, there is a dire need to explore this attack surface for designing the secure embedded hardware accelerators for CNNs. Towards this goal, in this paper, we exploited this attack surface to propose an HT-based attack called FeSHI. Since in horizontal collaboration of RC AIoT devices different sections of CNN architectures are outsourced to different untrusted third parties, the attacker may not know the input image, but it has access to the layer-by-layer output feature maps information for the assigned sections of the CNN architecture. This attack exploits the statistical distribution, i.e., Gaussian distribution, of the layer-by-layer feature maps of the CNN to design two triggers for stealthy HT with a very low probability of triggering. Also three different novel, stealthy and effective trigger designs are proposed. To illustrate the effectiveness of the proposed attack, we deployed the LeNet and LeNet-3D on PYNQ to classify the MNIST and CIFAR-10 datasets, respectively, and tested FeSHI. The experimental results show that FeSHI utilizes up to 2% extra LUTs, and the overall resource overhead is less than 1% compared to the original designs. It is also demonstrated on the PYNQ board that FeSHI triggers the attack vary randomly making it extremely difficult to detect.https://ieeexplore.ieee.org/document/9514588/Convolutional Neural NetworkCNNhardware securityedge intelligenceAIoTFPGA
spellingShingle Tolulope A. Odetola
Faiq Khalid
Hawzhin Mohammed
Travis C. Sandefur
Syed Rafay Hasan
FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack
IEEE Access
Convolutional Neural Network
CNN
hardware security
edge intelligence
AIoT
FPGA
title FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack
title_full FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack
title_fullStr FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack
title_full_unstemmed FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack
title_short FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack
title_sort feshi feature map based stealthy hardware intrinsic attack
topic Convolutional Neural Network
CNN
hardware security
edge intelligence
AIoT
FPGA
url https://ieeexplore.ieee.org/document/9514588/
work_keys_str_mv AT tolulopeaodetola feshifeaturemapbasedstealthyhardwareintrinsicattack
AT faiqkhalid feshifeaturemapbasedstealthyhardwareintrinsicattack
AT hawzhinmohammed feshifeaturemapbasedstealthyhardwareintrinsicattack
AT traviscsandefur feshifeaturemapbasedstealthyhardwareintrinsicattack
AT syedrafayhasan feshifeaturemapbasedstealthyhardwareintrinsicattack