Abstract
Differential Private Secure Federated Learning (DPSecure FL) ensures secure, privacy-preserving collaborative training by transmitting encrypted updates instead of raw data, addressing data-sharing constraints in critical real-time applications. Integrating FPGAs into DP-Secure FL benefits from their parallelism, low power consumption, and reconfigurability to overcome edge device resource limitations while improving efficiency, scalability, and adaptability in privacysensitive, resource-constrained environments. This integration enhances latency, scalability, reduced energy consumption, and computational efficiency while reducing cloud dependency and optimizing training processes. These combined benefits make FPGA-enabled DP-Secure FL an ideal solution for privacysensitive and resource-constrained environments, enabling robust scalability and adaptability for real-time applications, delivering robust privacy and security, and effectively protecting against external data leaks. This study reveals a significant vulnerability in FPGA-based DP-Secure FL, where the privacy-preserving setup hinders the detection of internal threats, such as freerider attacks. These attacks enable malicious users to exploit the system by contributing crafted gradients, such as through sponge poisoning, to increase the power consumption of honest users without impacting model accuracy. By introducing “innovative EvoWeight techniques”, we show how the power consumption of DNN-FPGA accelerators can be increased by up to 17.41 %. In addition to power consumption, the EvoWeight attack negatively affects other performance metrics, causing a 2.31 % rise in inference time, a 4.99 % increase in runtime, and a 4.75 % reduction in throughput. The study also highlights that when the fine-tuning is enabled on both the server and user ends in DP-Secure FL, the power consumption consistently increases in nearly all global rounds, with the maximum power consumption reaching 15.4 %. This increase in power consumption results in higher temperatures, leading to potential denial of service, system crashes, and a reduction in device lifetime.
| Original language | English |
|---|---|
| Title of host publication | 2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) |
| Publisher | IEEE |
| Pages | 182-193 |
| Number of pages | 12 |
| Edition | 2025 |
| ISBN (Electronic) | 979-8-3315-4198-9 |
| ISBN (Print) | 979-8-3315-4199-6 |
| DOIs | |
| Publication status | Published online - 7 Jul 2025 |
Publication series
| Name | 2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) |
|---|---|
| Publisher | IEEE Control Society |
| ISSN (Print) | 2835-5709 |
| ISSN (Electronic) | 2765-8406 |
Bibliographical note
Publisher Copyright:© 2025 IEEE.
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 7 Affordable and Clean Energy
Keywords
- Hardware Security
- Sponge Poisoning
- Power wasting
- Federated Learning
- FPGA
- Power Wasting
Fingerprint
Dive into the research topics of 'EvoWeight: Sponge Poisoning of FPGA-Based DNN Accelerators in Differential Private Secure Federated Learning'. Together they form a unique fingerprint.Student theses
-
Cardio-AI-ReAccel: reconfigurable accelerators for artificial intelligence in cardiology
Akram, M. S. (Author), Bogaraju, S. V. (Supervisor), Oct 2025Student thesis: Doctoral Thesis
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver