Exploiting device-level non-idealities for adversarial attacks on ReRAM-based neural networks

Resistive memory (ReRAM) or memristor devices offer the prospect of more efficient computing. While memristors have been used for a variety of computing systems, their usage has gained significant popularity in the domain of deep learning. Weight matrices in deep neural networks can be mapped to cro...

Full description

Bibliographic Details
Main Authors: Tyler McLemore, Robert Sunbury, Seth Brodzik, Zachary Cronin, Elias Timmons, Dwaipayan Chakraborty
Format: Article
Language:English
Published: Elsevier 2023-07-01
Series:Memories - Materials, Devices, Circuits and Systems
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2773064623000300
_version_ 1797796065408188416
author Tyler McLemore
Robert Sunbury
Seth Brodzik
Zachary Cronin
Elias Timmons
Dwaipayan Chakraborty
author_facet Tyler McLemore
Robert Sunbury
Seth Brodzik
Zachary Cronin
Elias Timmons
Dwaipayan Chakraborty
author_sort Tyler McLemore
collection DOAJ
description Resistive memory (ReRAM) or memristor devices offer the prospect of more efficient computing. While memristors have been used for a variety of computing systems, their usage has gained significant popularity in the domain of deep learning. Weight matrices in deep neural networks can be mapped to crossbar architectures with memristive junctions, generally resulting in superior performance and energy efficiency. However, the nascent nature of ReRAM technology is directly associated with the presence of inherent non-idealities in the ReRAM devices currently available. Deep neural networks have already been shown to be susceptible to adversarial attacks, often by targeting vulnerabilities in the networks’ internal representation of input data. In this paper, we explore the causal relationship between device-level non-idealities in ReRAM devices and the classification performance of memristor-based neural network accelerators. Specifically, our aim is to generate images which bypass adversarial defense mechanisms in software neural networks but trigger non-trivial performance discrepancies in ReRAM-based neural networks. To this end, we have proposed a framework to generate adversarial images in the hypervolume between the two decision boundaries, thereby leveraging non-ideal device behavior for performance detriment. We employ state-of-the-art tools in explainable artificial intelligence to characterize our adversarial image samples, and derive a new metric to quantify susceptibility to adversarial attacks at the pixel and device-levels.
first_indexed 2024-03-13T03:27:31Z
format Article
id doaj.art-97172b0f50a74872912fc1d33cce5d50
institution Directory Open Access Journal
issn 2773-0646
language English
last_indexed 2024-03-13T03:27:31Z
publishDate 2023-07-01
publisher Elsevier
record_format Article
series Memories - Materials, Devices, Circuits and Systems
spelling doaj.art-97172b0f50a74872912fc1d33cce5d502023-06-25T04:45:13ZengElsevierMemories - Materials, Devices, Circuits and Systems2773-06462023-07-014100053Exploiting device-level non-idealities for adversarial attacks on ReRAM-based neural networksTyler McLemore0Robert Sunbury1Seth Brodzik2Zachary Cronin3Elias Timmons4Dwaipayan Chakraborty5Department of Electrical and Computer Engineering, Rowan University, 201 Mullica Hill Rd, Glassboro, 08028, NJ, USADepartment of Electrical and Computer Engineering, Rowan University, 201 Mullica Hill Rd, Glassboro, 08028, NJ, USADepartment of Electrical and Computer Engineering, Rowan University, 201 Mullica Hill Rd, Glassboro, 08028, NJ, USADepartment of Electrical and Computer Engineering, Rowan University, 201 Mullica Hill Rd, Glassboro, 08028, NJ, USADepartment of Electrical and Computer Engineering, Rowan University, 201 Mullica Hill Rd, Glassboro, 08028, NJ, USACorresponding author.; Department of Electrical and Computer Engineering, Rowan University, 201 Mullica Hill Rd, Glassboro, 08028, NJ, USAResistive memory (ReRAM) or memristor devices offer the prospect of more efficient computing. While memristors have been used for a variety of computing systems, their usage has gained significant popularity in the domain of deep learning. Weight matrices in deep neural networks can be mapped to crossbar architectures with memristive junctions, generally resulting in superior performance and energy efficiency. However, the nascent nature of ReRAM technology is directly associated with the presence of inherent non-idealities in the ReRAM devices currently available. Deep neural networks have already been shown to be susceptible to adversarial attacks, often by targeting vulnerabilities in the networks’ internal representation of input data. In this paper, we explore the causal relationship between device-level non-idealities in ReRAM devices and the classification performance of memristor-based neural network accelerators. Specifically, our aim is to generate images which bypass adversarial defense mechanisms in software neural networks but trigger non-trivial performance discrepancies in ReRAM-based neural networks. To this end, we have proposed a framework to generate adversarial images in the hypervolume between the two decision boundaries, thereby leveraging non-ideal device behavior for performance detriment. We employ state-of-the-art tools in explainable artificial intelligence to characterize our adversarial image samples, and derive a new metric to quantify susceptibility to adversarial attacks at the pixel and device-levels.http://www.sciencedirect.com/science/article/pii/S2773064623000300ReRAMMemristorNon-idealityNeural networkAdversarial attackExplainable AI
spellingShingle Tyler McLemore
Robert Sunbury
Seth Brodzik
Zachary Cronin
Elias Timmons
Dwaipayan Chakraborty
Exploiting device-level non-idealities for adversarial attacks on ReRAM-based neural networks
Memories - Materials, Devices, Circuits and Systems
ReRAM
Memristor
Non-ideality
Neural network
Adversarial attack
Explainable AI
title Exploiting device-level non-idealities for adversarial attacks on ReRAM-based neural networks
title_full Exploiting device-level non-idealities for adversarial attacks on ReRAM-based neural networks
title_fullStr Exploiting device-level non-idealities for adversarial attacks on ReRAM-based neural networks
title_full_unstemmed Exploiting device-level non-idealities for adversarial attacks on ReRAM-based neural networks
title_short Exploiting device-level non-idealities for adversarial attacks on ReRAM-based neural networks
title_sort exploiting device level non idealities for adversarial attacks on reram based neural networks
topic ReRAM
Memristor
Non-ideality
Neural network
Adversarial attack
Explainable AI
url http://www.sciencedirect.com/science/article/pii/S2773064623000300
work_keys_str_mv AT tylermclemore exploitingdevicelevelnonidealitiesforadversarialattacksonrerambasedneuralnetworks
AT robertsunbury exploitingdevicelevelnonidealitiesforadversarialattacksonrerambasedneuralnetworks
AT sethbrodzik exploitingdevicelevelnonidealitiesforadversarialattacksonrerambasedneuralnetworks
AT zacharycronin exploitingdevicelevelnonidealitiesforadversarialattacksonrerambasedneuralnetworks
AT eliastimmons exploitingdevicelevelnonidealitiesforadversarialattacksonrerambasedneuralnetworks
AT dwaipayanchakraborty exploitingdevicelevelnonidealitiesforadversarialattacksonrerambasedneuralnetworks