Physical security of deep learning on edge devices: Comprehensive evaluation of fault injection attack vectors

Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu

    Publikation: Beitrag in FachzeitschriftArtikelBegutachtung

    Abstract

    Decision making tasks carried out by the usage of deep neural networks are successfully taking over in many areas, including those that are security critical, such as healthcare, transportation, smart grids, where intentional and unintentional failures can be disastrous. Edge computing systems are becoming ubiquitous nowadays, often serving deep learning tasks that do not need to be sent over to servers. Therefore, there is a necessity to evaluate the potential attacks that can target deep learning in the edge.

    In this work, we present evaluation of deep neural networks (DNNs) reliability against fault injection attacks. We first experimentally evaluate DNNs implemented in an embedded device by using laser fault injection to get the insight on possible attack vectors. We show practical results on four activation functions, ReLu, softmax, sigmoid, and tanh. We then perform a deep study on DNNs based on derived fault models by using several different attack strategies based on random faults. We also investigate a powerful attacker who can find effective fault location based on genetic algorithm, to show the most efficient attacks in terms of misclassification success rates. Finally, we show how a state of the art countermeasure against model extraction attack can be bypassed with a fault attack. Our results can serve as a basis to outline the susceptibility of DNNs to physical attacks which can be considered a viable attack vector whenever a device is deployed in hostile environment.
    OriginalspracheEnglisch
    FachzeitschriftMicroelectronics Reliability
    Jahrgang120
    Ausgabenummer5
    PublikationsstatusVeröffentlicht - 1 Mai 2021

    Fingerprint

    Untersuchen Sie die Forschungsthemen von „Physical security of deep learning on edge devices: Comprehensive evaluation of fault injection attack vectors“. Zusammen bilden sie einen einzigartigen Fingerprint.

    Dieses zitieren