Abstract
Spiking Neural Networks (SNNs) are a strong candidate to be used in future machine learning applications. SNNs can obtain the same accuracy of complex deep learning networks, while only using a fraction of its power. As a result, an increase in popularity of SNNs is expected in the near future for cyber physical systems, especially in the Internet of Things (IoT) segment. However, SNNs work very different than conventional neural network architectures. Consequently, applying SNNs in the field might introduce new unexpected security vulnerabilities. This paper explores and identifies potential sources of information leakage for the Izhikevich neuron, which is a popular neuron model used in digital implementations of SNNs. Simulations and experiments on FPGA implementation of the spiking neurons show that timing and power can be used to infer important information of the internal functionality of the network. Additionally, the paper demonstrates that is feasible to perform a reverse engineering attack using both power and timing leakage.
Original language | English |
---|---|
Title of host publication | 2021 24th Euromicro Conference on Digital System Design (DSD) |
Subtitle of host publication | Proceedings |
Editors | L. O'Conner |
Place of Publication | Piscataway |
Publisher | IEEE |
Pages | 514-518 |
Number of pages | 5 |
ISBN (Electronic) | 978-1-6654-2703-6 |
ISBN (Print) | 978-1-6654-2704-3 |
DOIs | |
Publication status | Published - 2021 |
Event | 2021 24th Euromicro Conference on Digital System Design (DSD) - Virtual at Palermo, Spain Duration: 1 Sep 2021 → 3 Sep 2021 |
Conference
Conference | 2021 24th Euromicro Conference on Digital System Design (DSD) |
---|---|
Abbreviated title | DSD 2021 |
Country/Territory | Spain |
City | Virtual at Palermo |
Period | 1/09/21 → 3/09/21 |