Security threat analyses and attack models for approximate computing systems

9Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

Approximate computing (AC) represents a paradigm shift from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy. The rapid progress on the development of diverse AC techniques allows us to apply approximate computing to many computation-intensive applications. However, the utilization of AC techniques could bring in new unique security threats to computing systems. This work does a survey on existing circuit-, architecture-, and compiler-level approximate mechanisms/algorithms, with special emphasis on potential security vulnerabilities. Qualitative and quantitative analyses are performed to assess the impact of the new security threats on AC systems. Moreover, this work proposes four unique visionary attack models, which systematically cover the attacks that build covert channels, compensate approximation errors, terminate normal error resilience mechanisms, and propagate additional errors. To thwart those attacks, this work further offers the guideline of countermeasure designs. Several case studies are provided to illustrate the implementation of the suggested countermeasures.

Cite

CITATION STYLE

APA

Yellu, P., Buell, L., Mark, M., Kinsy, M. A., Xu, D., & Yu, Q. (2021). Security threat analyses and attack models for approximate computing systems. ACM Transactions on Design Automation of Electronic Systems, 26(4). https://doi.org/10.1145/3442380

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free