Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs

Shayan Moini, Shanquan Tian, Daniel Holcomb, Jakub Szefer, Russell Tessier

Research output: Contribution to journalArticlepeer-review

34 Scopus citations

Abstract

To lower cost and increase the utilization of Cloud Field-Programmable Gate Arrays (FPGAs), researchers have recently been exploring the concept of multi-tenant FPGAs, where multiple independent users simultaneously share the same remote FPGA. Despite its benefits, multi-tenancy opens up the possibility of malicious users co-locating on the same FPGA as a victim user, and extracting sensitive information. This issue becomes especially serious when the user is running a machine learning algorithm that is processing sensitive or private information. To demonstrate the dangers, this paper presents a remote, power-based side-channel attack on a deep neural network accelerator running in a variety of Xilinx FPGAs and also on Cloud FPGAs using Amazon Web Services (AWS) F1 instances. This work in particular shows how to remotely obtain voltage estimates as a deep neural network inference circuit executes, and how the information can be used to recover the inputs to the neural network. The attack is demonstrated with a binarized convolutional neural network used to recognize handwriting images from the MNIST handwritten digit database. With the use of precise time-to-digital converters for remote voltage estimation, the MNIST inputs can be successfully recovered with a maximum normalized cross-correlation of 79% between the input image and the recovered image on local FPGA boards and 72% on AWS F1 instances. The attack requires no physical access nor modifications to the FPGA hardware.

Original languageEnglish (US)
Article number9409116
Pages (from-to)357-370
Number of pages14
JournalIEEE Journal on Emerging and Selected Topics in Circuits and Systems
Volume11
Issue number2
DOIs
StatePublished - Jun 2021

Funding

Manuscript received December 10, 2020; revised February 18, 2021; accepted April 16, 2021. Date of publication April 20, 2021; date of current version June 14, 2021. This work was supported in part by NSF under Grant CNS-1901901 and Grant CNS-1902532. This article was recommended by Guest Editor K. Basu. (Corresponding author: Shayan Moini.) Shayan Moini, Daniel Holcomb, and Russell Tessier are with the Department of Electrical and Computer Engineering, University of Massachusetts at Amherst, Amherst, MA 01003 USA (e-mail: [email protected]; [email protected]; [email protected]).

Keywords

  • convolutional neural networks
  • deep neural networks
  • power attacks
  • Remote attacks
  • side-channel attacks
  • time-to-digital converters (TDCs)

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs'. Together they form a unique fingerprint.

Cite this