2021
DOI: 10.1145/3442380
|View full text |Cite
|
Sign up to set email alerts
|

Security Threat Analyses and Attack Models for Approximate Computing Systems

Abstract: Approximate computing (AC) represents a paradigm shift from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy. The rapid progress on the development of diverse AC techniques allows us to apply approximate computing to many computation-intensive applications. However, the utilization of AC techniques could bring in new unique security threats to computing systems. This work does a survey on existing circuit-, architecture-, and compiler-level approxim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 53 publications
0
2
0
Order By: Relevance
“…The in situ computing offered by memristive crossbar arrays is a form of approximate computing, in which a shift is made "from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy" [16]. Memristor computation falls into this category due to the inherently inexact nature of analog compared to classical digital computation.…”
Section: Approximate Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…The in situ computing offered by memristive crossbar arrays is a form of approximate computing, in which a shift is made "from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy" [16]. Memristor computation falls into this category due to the inherently inexact nature of analog compared to classical digital computation.…”
Section: Approximate Computingmentioning
confidence: 99%
“…While this new paradigm offers performance improvements, it also exposes several new attack surfaces. Yellu et al [16] introduces four new potential attack scenarios: Building Covert Channel, Error Compensation, Tampering Error Resilience Mechanism, and Error Propagation attacks. Building Covert Channel attacks involve the exploitation of approximate compute modules in order to open passive side channels to enable the leakage of covert information.…”
Section: Approximate Computingmentioning
confidence: 99%