We’ve all been there. You’re looking for a job but are struggling to create a resume that will catch the eye of potential employers. You’re asking questions like how do I make my resume visually appealing? How can I make myself sound professional? What about formatting?…
Beyond Expectations: AI Agents and the Next Chapter of Work
AI agents, or autonomous agents, are in their early days. Very early – the bottom of the first inning early. The field is buzzing with innovation, from groundbreaking research to proof of concepts to practical applications – all hinting at AI’s vast potential. There is no…
Steve Salvin, Founder & CEO of Aiimi – Interview Series
Steve Salvin is the founder and CEO of Aiimi, an AI platform which has been quietly scaling since 2013. Having bootstrapped the company since launch, Steve has grown Aiimi to 8-figure revenues and their tech is used by the likes of the FCA, PwC, and the…
FrugalGPT: A Paradigm Shift in Cost Optimization for Large Language Models
Large Language Models (LLMs) represent a significant breakthrough in Artificial Intelligence (AI). They excel in various language tasks such as understanding, generation, and manipulation. These models, trained on extensive text datasets using advanced deep learning algorithms, are applied in autocomplete suggestions, machine translation, question answering, text…
This tiny chip can safeguard user data while enabling efficient computing on a smartphone
Health-monitoring apps can help people manage chronic diseases or stay on track with fitness goals, using nothing more than a smartphone. However, these apps can be slow and energy-inefficient because the vast machine-learning models that power them must be shuttled between a smartphone and a central memory server.
Engineers often speed things up using hardware that reduces the need to move so much data back and forth. While these machine-learning accelerators can streamline computation, they are susceptible to attackers who can steal secret information.
To reduce this vulnerability, researchers from MIT and the MIT-IBM Watson AI Lab created a machine-learning accelerator that is resistant to the two most common types of attacks. Their chip can keep a user’s health records, financial information, or other sensitive data private while still enabling huge AI models to run efficiently on devices.
The team developed several optimizations that enable strong security while only slightly slowing the device. Moreover, the added security does not impact the accuracy of computations. This machine-learning accelerator could be particularly beneficial for demanding AI applications like augmented and virtual reality or autonomous driving.
While implementing the chip would make a device slightly more expensive and less energy-efficient, that is sometimes a worthwhile price to pay for security, says lead author Maitreyi Ashok, an electrical engineering and computer science (EECS) graduate student at MIT.
“It is important to design with security in mind from the ground up. If you are trying to add even a minimal amount of security after a system has been designed, it is prohibitively expensive. We were able to effectively balance a lot of these tradeoffs during the design phase,” says Ashok.
Her co-authors include Saurav Maji, an EECS graduate student; Xin Zhang and John Cohn of the MIT-IBM Watson AI Lab; and senior author Anantha Chandrakasan, MIT’s chief innovation and strategy officer, dean of the School of Engineering, and the Vannevar Bush Professor of EECS. The research will be presented at the IEEE Custom Integrated Circuits Conference.
Side-channel susceptibility
The researchers targeted a type of machine-learning accelerator called digital in-memory compute. A digital IMC chip performs computations inside a device’s memory, where pieces of a machine-learning model are stored after being moved over from a central server.
The entire model is too big to store on the device, but by breaking it into pieces and reusing those pieces as much as possible, IMC chips reduce the amount of data that must be moved back and forth.
But IMC chips can be susceptible to hackers. In a side-channel attack, a hacker monitors the chip’s power consumption and uses statistical techniques to reverse-engineer data as the chip computes. In a bus-probing attack, the hacker can steal bits of the model and dataset by probing the communication between the accelerator and the off-chip memory.
Digital IMC speeds computation by performing millions of operations at once, but this complexity makes it tough to prevent attacks using traditional security measures, Ashok says.
She and her collaborators took a three-pronged approach to blocking side-channel and bus-probing attacks.
First, they employed a security measure where data in the IMC are split into random pieces. For instance, a bit zero might be split into three bits that still equal zero after a logical operation. The IMC never computes with all pieces in the same operation, so a side-channel attack could never reconstruct the real information.
But for this technique to work, random bits must be added to split the data. Because digital IMC performs millions of operations at once, generating so many random bits would involve too much computing. For their chip, the researchers found a way to simplify computations, making it easier to effectively split data while eliminating the need for random bits.
Second, they prevented bus-probing attacks using a lightweight cipher that encrypts the model stored in off-chip memory. This lightweight cipher only requires simple computations. In addition, they only decrypted the pieces of the model stored on the chip when necessary.
Third, to improve security, they generated the key that decrypts the cipher directly on the chip, rather than moving it back and forth with the model. They generated this unique key from random variations in the chip that are introduced during manufacturing, using what is known as a physically unclonable function.
“Maybe one wire is going to be a little bit thicker than another. We can use these variations to get zeros and ones out of a circuit. For every chip, we can get a random key that should be consistent because these random properties shouldn’t change significantly over time,” Ashok explains.
They reused the memory cells on the chip, leveraging the imperfections in these cells to generate the key. This requires less computation than generating a key from scratch.
“As security has become a critical issue in the design of edge devices, there is a need to develop a complete system stack focusing on secure operation. This work focuses on security for machine-learning workloads and describes a digital processor that uses cross-cutting optimization. It incorporates encrypted data access between memory and processor, approaches to preventing side-channel attacks using randomization, and exploiting variability to generate unique codes. Such designs are going to be critical in future mobile devices,” says Chandrakasan.
Safety testing
To test their chip, the researchers took on the role of hackers and tried to steal secret information using side-channel and bus-probing attacks.
Even after making millions of attempts, they couldn’t reconstruct any real information or extract pieces of the model or dataset. The cipher also remained unbreakable. By contrast, it took only about 5,000 samples to steal information from an unprotected chip.
The addition of security did reduce the energy efficiency of the accelerator, and it also required a larger chip area, which would make it more expensive to fabricate.
The team is planning to explore methods that could reduce the energy consumption and size of their chip in the future, which would make it easier to implement at scale.
“As it becomes too expensive, it becomes harder to convince someone that security is critical. Future work could explore these tradeoffs. Maybe we could make it a little less secure but easier to implement and less expensive,” Ashok says.
The research is funded, in part, by the MIT-IBM Watson AI Lab, the National Science Foundation, and a Mathworks Engineering Fellowship.
Microsoft Expands Content Integrity Tools to Support Global Elections Amid Generative AI Concerns
The year 2024 is set to be a significant one for elections worldwide, with the European Union holding parliamentary elections this summer and approximately half of European countries preparing for national or regional votes. As this democratic exercise unfolds, the rapid advancement of generative AI has…
The impact and challenges of generative AI in healthcare
Examining generative AI in healthcare: innovations, consumer views, and pressing ethical considerations….
Separation of Concerns: Achieving Breakthrough Synergy in Decision Management
At its core, software is written to automate functions – fundamentally that is through workflow that orchestrates over actions. The most essential action within software that affects business outcomes are business decisions. But oftentimes, the employee who initially established the guiding rules for a software decision…
Daniel Ciolek, Head of Research and Development at InvGate – Interview Series
Daniel is a passionate IT professional with more than 15 years of experience in the industry. He has a PhD. in Computer Science and a long career in technology research. His interests fall in multiple areas, such as Artificial Intelligence, Software Engineering, and High Performance Computing….
Transforming Telehealth: How AI-Powered Virtual Consultations and Remote Monitoring Are Shaping the Future of Healthcare
As technology reshapes various industries, healthcare is undergoing some of the most significant transformations. Originally developed to monitor astronauts’ health in space, telehealth has emerged as a crucial healthcare tool, particularly during the COVID-19 pandemic. This development has now entered a new phase with the integration…