Approximate computing is an advanced computational technique that trades the accuracy of computation results for better utilization of system resources. It has emerged as a new preferable paradigm over traditional computing architectures for many applications where inaccurate results are acceptable. However, approximate computing also introduces security vulnerabilities mainly due to the fact that the uncertain and unpredictable intrinsic errors during approximate execution may be indistinguishable from malicious modification of the input data, the execution process, and the results. On the other hand, interestingly, approximate computing presents new opportunities to secure the system and the computation. Existing work on the security of approximate computing covers threat models, countermeasures, and evaluations but lacks a framework for analysis and comparison. In this article, we provide a classification of the state-of-the-art works in this research field, including threat models in approximate computing and promising security approaches using approximate computing. Open questions and potential future research directions are also discussed.
Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities / Liu, Weiqiang; Gu, Chongyan; O'Neill, Maire; Qu, Gang; Montuschi, Paolo; Lombardi, Fabrizio. - In: PROCEEDINGS OF THE IEEE. - ISSN 0018-9219. - ELETTRONICO. - 108:12(2020), pp. 2214-2231. [10.1109/JPROC.2020.3030121]
Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities
Montuschi, Paolo;
2020
Abstract
Approximate computing is an advanced computational technique that trades the accuracy of computation results for better utilization of system resources. It has emerged as a new preferable paradigm over traditional computing architectures for many applications where inaccurate results are acceptable. However, approximate computing also introduces security vulnerabilities mainly due to the fact that the uncertain and unpredictable intrinsic errors during approximate execution may be indistinguishable from malicious modification of the input data, the execution process, and the results. On the other hand, interestingly, approximate computing presents new opportunities to secure the system and the computation. Existing work on the security of approximate computing covers threat models, countermeasures, and evaluations but lacks a framework for analysis and comparison. In this article, we provide a classification of the state-of-the-art works in this research field, including threat models in approximate computing and promising security approaches using approximate computing. Open questions and potential future research directions are also discussed.File | Dimensione | Formato | |
---|---|---|---|
09244148.pdf
non disponibili
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
3.98 MB
Formato
Adobe PDF
|
3.98 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Final PIEEE_manuscript.pdf
accesso aperto
Descrizione: final authors' version
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
PUBBLICO - Tutti i diritti riservati
Dimensione
6.54 MB
Formato
Adobe PDF
|
6.54 MB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2851031