Date of Award
Fall 2023
Project Type
Dissertation
Program or Major
Electrical and Computer Engineering
Degree Name
Doctor of Philosophy
First Advisor
Qiaoyan Yu
Second Advisor
LaCourse LaCourse
Third Advisor
Shaad Md Mahmud
Abstract
Approximate Computing (AC) techniques have been leveraged to improve computing performance and energy efficiency with minor degradation in accuracy. Different than conventional computing, AC allows the computation to deviate from the reference or deterministic execution behavior. Thus, AC has emerged as a new paradigm of computing systems, especially for the applications such as image processing, audio recognition, and artificial intelligence. The majority of research efforts on approximate computing focus on new approximation mechanism design and implementation, rather than examining the security vulnerabilities of AC systems. To fill this gap, we first analyze the potential security threats induced by the AC techniques applied at various levels of the computing stack. Qualitative and quantitative analyses are performed to assess the impact of the new security threats. Next, we propose systematic attack models, which systematically cover the attacks that build covert channels, compensate errors, terminate error resilience mechanisms, and propagate errors. To thwart those projected attacks, we further develop a guideline for countermeasure designs, in which randomization, access prohibition, design obfuscation, and noise injection are the four main principles. Two detailed obfuscation schemes are developed to obscure the entrance of attack surfaces and eliminate the explicit transition between approximate and precise modes, thus improving AC systems' resilience against attacks that tamper with approximate precise boundaries. We further developed a detection mechanism that leverages the intermediate node signals to differentiate the approximation errors from the intentional fault injection. Our countermeasures have the potential to effectively assure AC systems obtain high availability, confidentiality, integrity, and anti-piracy capability.
Recommended Citation
Yellu, Pruthvy, "Securing Approximate Computing Systems" (2023). Doctoral Dissertations. 2818.
https://scholars.unh.edu/dissertation/2818