Towards hardware Trojan resilient convolutional neural networks accelerators
Towards hardware Trojan resilient convolutional neural networks accelerators
Convolutional neural network accelerators are increasingly used in safety-critical applications, including autonomous vehicles. Therefore, particularly vulnerable to hardware Trojan insertion, a security attack that takes place during the development of integrated circuits. This work presents for the first time, a large-scale study of the impact of hardware Trojan insertion on convolutional neural network accelerators, focusing on those that use approximate commuting techniques, prevalent in embedded applications. We investigate three types of such networks, MobileNet V2, ShuffleNet V2, and GhostNet, trained in datasets of grayscale speed limit sign images and GTSRB. Our results show that certain parts of these architectures are more susceptible to hardware Trojan attacks, specifically a specific set of procession elements, referred to as “important”, in the classification, Relu6, and Max pooling layers, respectively. These findings are subsequently used to develop two countermeasures, the first relies on selective hardware redundancy(SHR), and the second uses a combination of hardware and time redundancy(SHTR). The proposed defenses are experimentally validated. Our results show that the SHR provides speedy recovery from an attack while incurring between 6-10% area overheads. Whereas SHTR requires more time to detect the Trojan, and its area overhead is much smaller (~ 0.3%).
Sun, Peiyao
e517faec-75c2-43e4-a45e-90f47e80d195
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Kazmierski, Tom J.
a97d7958-40c3-413f-924d-84545216092a
Sun, Peiyao
e517faec-75c2-43e4-a45e-90f47e80d195
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Kazmierski, Tom J.
a97d7958-40c3-413f-924d-84545216092a
Sun, Peiyao, Halak, Basel and Kazmierski, Tom J.
(2025)
Towards hardware Trojan resilient convolutional neural networks accelerators.
Journal of Hardware and Systems Security.
(doi:10.1007/s41635-025-00164-y).
Abstract
Convolutional neural network accelerators are increasingly used in safety-critical applications, including autonomous vehicles. Therefore, particularly vulnerable to hardware Trojan insertion, a security attack that takes place during the development of integrated circuits. This work presents for the first time, a large-scale study of the impact of hardware Trojan insertion on convolutional neural network accelerators, focusing on those that use approximate commuting techniques, prevalent in embedded applications. We investigate three types of such networks, MobileNet V2, ShuffleNet V2, and GhostNet, trained in datasets of grayscale speed limit sign images and GTSRB. Our results show that certain parts of these architectures are more susceptible to hardware Trojan attacks, specifically a specific set of procession elements, referred to as “important”, in the classification, Relu6, and Max pooling layers, respectively. These findings are subsequently used to develop two countermeasures, the first relies on selective hardware redundancy(SHR), and the second uses a combination of hardware and time redundancy(SHTR). The proposed defenses are experimentally validated. Our results show that the SHR provides speedy recovery from an attack while incurring between 6-10% area overheads. Whereas SHTR requires more time to detect the Trojan, and its area overhead is much smaller (~ 0.3%).
Text
Towards Hardware Trojan Resilient Convolutional Neural Networks Accelerators
- Accepted Manuscript
Text
s41635-025-00164-y
- Version of Record
More information
Accepted/In Press date: 1 July 2025
e-pub ahead of print date: 1 August 2025
Identifiers
Local EPrints ID: 504434
URI: http://eprints.soton.ac.uk/id/eprint/504434
ISSN: 2509-3436
PURE UUID: 0d82bfcc-32ad-4989-9a49-48638af18ad7
Catalogue record
Date deposited: 09 Sep 2025 17:48
Last modified: 11 Sep 2025 03:13
Export record
Altmetrics
Contributors
Author:
Peiyao Sun
Author:
Basel Halak
Author:
Tom J. Kazmierski
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics