• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学 ›› 2025, Vol. 47 ›› Issue (10): 1756-1766.

• 计算机网络与信息安全 • 上一篇    下一篇

面向精度可配置近似加法器的新的攻击模式和防护措施

汪昊南,王真   

  1. (上海电力大学计算机科学与技术学院,上海 201306)

  • 收稿日期:2025-09-28 出版日期:2025-10-25 发布日期:2025-10-28
  • 基金资助:
    计算机体系结构国家重点实验室开放课题(CARCHA202005) 

New attack modes and protection measures for configurable approximate adder

WANG Haonan,WANG Zhen   

  1.  (College of Computer Science and Technology,Shanghai University of Electric Power,Shanghai 201306,China)

  • Received:2025-09-28 Online:2025-10-25 Published:2025-10-28

摘要: 近似计算电路面向具有内在差错容忍特性的应用,通过牺牲一定的计算精度,取得了计算性能和能耗效率上的优势。然而,近期的研究指出近似计算电路的近似机制可能会被利用来制造新的攻击。对于攻击实例以及对应的检测方法或防护方法的探索逐渐引起广泛关注。到目前为止,对于近似计算电路安全威胁的调查仍处于初期阶段,只有少数的研究提出了具体的攻击实例,并且缺乏面向精度可配置近似加法器的攻击模式和防护措施的研究。因此,这迫切需要对已有的精度可配置近似加法器进行调查并提出可能的攻击方法来揭示新的安全威胁。在此背景下提出了一种针对精度可配置近似加法器的近似精确边界(APB)攻击,并对2种攻击模式进行了分析。此外,还提出了2种防护措施,分别是近似类型随机选择和近似配置授权电路。实验结果表明,近似配置授权电路能够以10.17%的额外面积开销、低于13%的额外功耗开销以及可以忽略不计的额外延迟开销对攻击进行防护。

关键词: 近似计算电路, 硬件安全, 图像处理, 近似类型随机选择, 近似配置授权

Abstract: Approximate computing circuits are designed for applications with inherent error tolerance.By sacrificing a certain degree of computational accuracy,they achieve advantages in computational performance and energy efficiency.However,recent studies have pointed out that the approximation mechanisms of approximate computing circuits may be exploited to create new attacks.The exploration of attack instances and corresponding detection or protection methods is gradually attracting widespread attention.So far,the investigation into the security threats of approximate computing circuits is still in its early stages.Only a few studies have proposed specific attack examples,and there is a lack of research on attack patterns and protective measures for configurable approximate adders.Therefore,there is an urgent need to investigate existing configurable approximate adders and propose possible attack methods to reveal new security threats.This paper proposes an approximate-precise boundary (APB) attack targeting configurable approximate adders and analyzes two attack modes.In addition, two protective measures,namely approximate types random selection and approximate configuration authorization circuits, are proposed.Experimental results show that the approximate configuration authorization circuit can protect against attacks with an additional area overhead of 10.17%,an additional power consumption overhead of less than 13%,and negligible additional delay overhead.


Key words: approximate computing circuit, hardware security, image processing, approximate types random select, approximate configuration authorization