dc.contributor.author | Lee, Kyungmi | |
dc.contributor.author | Yan, Mengjia | |
dc.contributor.author | Emer, Joel | |
dc.contributor.author | Chandrakasan, Anantha P | |
dc.date.accessioned | 2024-01-03T20:06:17Z | |
dc.date.available | 2024-01-03T20:06:17Z | |
dc.date.issued | 2023-10-28 | |
dc.identifier.isbn | 979-8-4007-0329-4 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/153271 | |
dc.description.abstract | Deep neural networks (DNNs) are gaining popularity in a wide range of domains, ranging from speech and video recognition to healthcare. With this increased adoption comes the pressing need for securing DNN execution environments on CPUs, GPUs, and ASICs. While there are active research efforts in supporting a trusted execution environment (TEE) on CPUs, the exploration in supporting TEEs on accelerators is limited, with only a few solutions available [18, 19, 27]. A key limitation along this line of work is that these secure DNN accelerators narrowly consider a few specific architectures. The design choices and the associated cost for securing these architectures do not transfer to other diverse architectures.
This paper strives to address this limitation by developing a design space exploration tool for supporting TEEs on diverse DNN accelerators. We target secure DNN accelerators equipped with cryptographic engines where the cryptographic operations are closely coupled with the data movement in the accelerators. These operations significantly complicate the scheduling for DNN accelerators, as the scheduling needs to account for the extra on-chip computation and off-chip memory accesses introduced by these cryptographic operations, and even needs to account for potential interactions across DNN layers.
We tackle these challenges in our tool, called SecureLoop, by introducing a scheduling search engine with the following attributes: 1) considers the cryptographic overhead associated with every off-chip data access, 2) uses an efficient modular arithmetic technique to compute the optimal authentication block assignment for each individual layer, and 3) uses a simulated annealing algorithm to perform cross-layer optimizations. Compared to the conventional schedulers, our tool finds the schedule for secure DNN designs with up to 33.2% speedup and 50.2% improvement of energy-delay-product. | en_US |
dc.publisher | ACM|56th Annual IEEE/ACM International Symposium on Microarchitecture | en_US |
dc.relation.isversionof | https://doi.org/10.1145/3613424.3614273 | en_US |
dc.rights | Creative Commons Attribution | en_US |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | en_US |
dc.title | SecureLoop: Design Space Exploration of Secure DNN Accelerators | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Lee, Kyungmi, Yan, Mengjia, Emer, Joel and Chandrakasan, Anantha. 2023. "SecureLoop: Design Space Exploration of Secure DNN Accelerators." | |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | |
dc.identifier.mitlicense | PUBLISHER_CC | |
dc.identifier.mitlicense | PUBLISHER_CC | |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dc.date.updated | 2024-01-01T08:47:13Z | |
dc.language.rfc3066 | en | |
dc.rights.holder | The author(s) | |
dspace.date.submission | 2024-01-01T08:47:13Z | |
mit.license | PUBLISHER_CC | |
mit.metadata.status | Authority Work and Publication Information Needed | en_US |