TY - JOUR
T1 - Leveraging Ferroelectric Stochasticity and In-Memory Computing for DNN IP Obfuscation
AU - Mankali, Likhitha
AU - Rangarajan, Nikhil
AU - Chatterjee, Swetaki
AU - Kumar, Shubham
AU - Chauhan, Yogesh Singh
AU - Sinanoglu, Ozgur
AU - Amrouch, Hussam
N1 - Funding Information:
This work was supported in part by the Center for Cyber Security (CCS) at New York University Abu Dhabi (NYUAD).
Publisher Copyright:
© 2014 IEEE.
PY - 2022/12/1
Y1 - 2022/12/1
N2 - With the emergence of the Internet of Things (IoT), deep neural networks (DNNs) are widely used in different domains, such as computer vision, healthcare, social media, and defense. The hardware-level architecture of a DNN can be built using an in-memory computing-based design, which is loaded with the weights of a well-trained DNN model. However, such hardware-based DNN systems are vulnerable to model stealing attacks where an attacker reverse-engineers (REs) and extracts the weights of the DNN model. In this work, we propose an energy-efficient defense technique that combines a ferroelectric field effect transistor (FeFET)-based reconfigurable physically unclonable function (PUF) with an in-memory FeFET XNOR to thwart model stealing attacks. We leverage the inherent stochasticity in the FE domains to build a PUF that helps to corrupt the neural network's (NN) weights when an adversarial attack is detected. We showcase the efficacy of the proposed defense scheme by performing experiments on graph-NNs (GNNs), a particular type of DNN. The proposed defense scheme is a first of its kind that evaluates the security of GNNs. We investigate the effect of corrupting the weights on different layers of the GNN on the accuracy degradation of the graph classification application for two specific error models of corrupting the FeFET-based PUFs and five different bioinformatics datasets. We demonstrate that our approach successfully degrades the inference accuracy of the graph classification by corrupting any layer of the GNN after a small rewrite pulse.
AB - With the emergence of the Internet of Things (IoT), deep neural networks (DNNs) are widely used in different domains, such as computer vision, healthcare, social media, and defense. The hardware-level architecture of a DNN can be built using an in-memory computing-based design, which is loaded with the weights of a well-trained DNN model. However, such hardware-based DNN systems are vulnerable to model stealing attacks where an attacker reverse-engineers (REs) and extracts the weights of the DNN model. In this work, we propose an energy-efficient defense technique that combines a ferroelectric field effect transistor (FeFET)-based reconfigurable physically unclonable function (PUF) with an in-memory FeFET XNOR to thwart model stealing attacks. We leverage the inherent stochasticity in the FE domains to build a PUF that helps to corrupt the neural network's (NN) weights when an adversarial attack is detected. We showcase the efficacy of the proposed defense scheme by performing experiments on graph-NNs (GNNs), a particular type of DNN. The proposed defense scheme is a first of its kind that evaluates the security of GNNs. We investigate the effect of corrupting the weights on different layers of the GNN on the accuracy degradation of the graph classification application for two specific error models of corrupting the FeFET-based PUFs and five different bioinformatics datasets. We demonstrate that our approach successfully degrades the inference accuracy of the graph classification by corrupting any layer of the GNN after a small rewrite pulse.
KW - Deep neural networks (DNNs)
KW - ferroelectric field effect transistor (FeFET)
KW - graph neural networks (GNNs)
KW - hardware security
KW - model stealing attacks
UR - http://www.scopus.com/inward/record.url?scp=85141534446&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85141534446&partnerID=8YFLogxK
U2 - 10.1109/JXCDC.2022.3217043
DO - 10.1109/JXCDC.2022.3217043
M3 - Article
AN - SCOPUS:85141534446
SN - 2329-9231
VL - 8
SP - 102
EP - 110
JO - IEEE Journal on Exploratory Solid-State Computational Devices and Circuits
JF - IEEE Journal on Exploratory Solid-State Computational Devices and Circuits
IS - 2
ER -