Privacy Leakages in Approximate Adders

02/24/2018
by   Shahrzad Keshavarz, et al.
0

Approximate computing has recently emerged as a promising method to meet the low power requirements of digital designs. The erroneous outputs produced in approximate computing can be partially a function of each chip's process variation. We show that, in such schemes, the erroneous outputs produced on each chip instance can reveal the identity of the chip that performed the computation, possibly jeopardizing user privacy. In this work, we perform simulation experiments on 32-bit Ripple Carry Adders, Carry Lookahead Adders, and Han-Carlson Adders running at over-scaled operating points. Our results show that identification is possible, we contrast the identifiability of each type of adder, and we quantify how success of identification varies with the extent of over-scaling and noise. Our results are the first to show that approximate digital computations may compromise privacy. Designers of future approximate computing systems should be aware of the possible privacy leakages and decide whether mitigation is warranted in their application.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/16/2017

Approximate Ripple Carry and Carry Lookahead Adders - A Comparative Analysis

Approximate ripple carry adders (RCAs) and carry lookahead adders (CLAs)...
research
01/18/2022

Identification for Accountability vs Privacy

This document considers the counteracting requirements of privacy and ac...
research
08/26/2020

An Approximate Carry Estimating Simultaneous Adder with Rectification

Approximate computing has in recent times found significant applications...
research
02/13/2019

Business Process Privacy Analysis in Pleak

Pleak is a tool to capture and analyze privacy-enhanced business process...
research
05/10/2022

A 14uJ/Decision Keyword Spotting Accelerator with In-SRAM-Computing and On Chip Learning for Customization

Keyword spotting has gained popularity as a natural way to interact with...
research
04/03/2016

A New Learning Method for Inference Accuracy, Core Occupation, and Performance Co-optimization on TrueNorth Chip

IBM TrueNorth chip uses digital spikes to perform neuromorphic computing...
research
07/15/2016

DiaSys: Improving SoC Insight Through On-Chip Diagnosis

To find the cause of a functional or non-functional defect (bug) in soft...

Please sign up or login with your details

Forgot password? Click here to reset