Understanding Security Threats in Emerging Neuromorphic Computing Architecture
Neuromorphic computing marks the beginning of a new era in computing system design, owing to the introduction of complex and unorthodox non-Von Neumann architectures, in conjunction with new post-CMOS nano-ionic devices. These neuromorphic chips are projected to soon become a mainstay platform for a...
Gespeichert in:
Veröffentlicht in: | Journal of hardware and systems security 2021-03, Vol.5 (1), p.45-57 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Neuromorphic computing marks the beginning of a new era in computing system design, owing to the introduction of complex and unorthodox non-Von Neumann architectures, in conjunction with new post-CMOS nano-ionic devices. These neuromorphic chips are projected to soon become a mainstay platform for a diverse set of applications, ranging from day-to-day rudimentary decision making, to safety critical defense and healthcare management. In this environment, hardware security can no longer take an auxiliary role in system design. In this work, we lay a solid foundation of understanding the broad security implications of emerging memristor-based neuromorphic computing paradigm. We investigate various security loopholes arising from an untrustworthy neuromorphic design environment. We propose, examine and evaluate the security threats arising from—
(a)
covert hardware Trojans and
(b)
external attacks exploiting implementation-specific vulnerabilities. Subsequently, we discuss three specific attacks targeting crucial components of the neuromorphic design and demonstrate how the security breaches in the neuromorphic systems can directly impact the end-user experience. Uncovering these security vulnerabilities in the emerging neuromorphic computing paradigm can be instrumental in shaping our design practices. |
---|---|
ISSN: | 2509-3428 2509-3436 |
DOI: | 10.1007/s41635-021-00110-8 |