On the (In)security of Approximate Computing Synthesis

12/03/2019
by   , et al.
0

The broad landscape of new applications requires minimal hardware resources without any sacrifice in Quality-of-Results. Approximate Computing (AC) has emerged to meet the demands of data-rich applications. Although AC applies techniques to improve the energy efficiency of error-tolerant applications at the cost of computational accuracy, new challenges in security threats of AC should be simultaneously addressed. In this paper, we introduce the security vulnerability of the concurrent AC synthesis. We analyze the threat landscape and provide a broader view of the attack and defense strategy. As a case study, we utilize AC synthesis technique to perform malicious modifications in the synthesized approximate netlist. Similarly, we provide a scalable defense framework for trustworthy AC synthesis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/02/2023

Systemic Risk and Vulnerability Analysis of Multi-cloud Environments

With the increasing use of multi-cloud environments, security profession...
research
06/04/2023

Spear or Shield: Leveraging Generative AI to Tackle Security Threats of Intelligent Network Services

Generative AI (GAI) models have been rapidly advancing, with a wide rang...
research
09/04/2020

Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud

Moving Target Defense (MTD) is a proactive security mechanism which chan...
research
08/18/2022

Electronic, Wireless, and Photonic Network-on-Chip Security: Challenges and Countermeasures

Networks-on-chips (NoCs) are an integral part of emerging manycore compu...
research
06/27/2020

Domain Name System Security and Privacy: A Contemporary Survey

The domain name system (DNS) is one of the most important components of ...
research
01/27/2020

Proactive Allocation as Defense for Malicious Co-residency in Sliced 5G Core Networks

Malicious co-residency in virtualized networks poses a real threat. The ...
research
08/22/2022

An Input-Aware Mimic Defense Theory and its Practice

The current security problems in cyberspace are characterized by strong ...

Please sign up or login with your details

Forgot password? Click here to reset