Understanding Security Threats in Emerging Neuromorphic Computing Architecture

Neuromorphic computing marks the beginning of a new era in computing system design, owing to the introduction of complex and unorthodox non-Von Neumann architectures, in conjunction with new post-CMOS nano-ionic devices. These neuromorphic chips are projected to soon become a mainstay platform for a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of hardware and systems security 2021-03, Vol.5 (1), p.45-57
Hauptverfasser: Rajamanikkam, Chidhambaranathan, JS, Rajesh, Roy, Sanghamitra, Chakraborty, Koushik
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 57
container_issue 1
container_start_page 45
container_title Journal of hardware and systems security
container_volume 5
creator Rajamanikkam, Chidhambaranathan
JS, Rajesh
Roy, Sanghamitra
Chakraborty, Koushik
description Neuromorphic computing marks the beginning of a new era in computing system design, owing to the introduction of complex and unorthodox non-Von Neumann architectures, in conjunction with new post-CMOS nano-ionic devices. These neuromorphic chips are projected to soon become a mainstay platform for a diverse set of applications, ranging from day-to-day rudimentary decision making, to safety critical defense and healthcare management. In this environment, hardware security can no longer take an auxiliary role in system design. In this work, we lay a solid foundation of understanding the broad security implications of emerging memristor-based neuromorphic computing paradigm. We investigate various security loopholes arising from an untrustworthy neuromorphic design environment. We propose, examine and evaluate the security threats arising from— (a) covert hardware Trojans and (b) external attacks exploiting implementation-specific vulnerabilities. Subsequently, we discuss three specific attacks targeting crucial components of the neuromorphic design and demonstrate how the security breaches in the neuromorphic systems can directly impact the end-user experience. Uncovering these security vulnerabilities in the emerging neuromorphic computing paradigm can be instrumental in shaping our design practices.
doi_str_mv 10.1007/s41635-021-00110-8
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2932844423</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2932844423</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1158-ae2dc537bd549a4ec7e5557672f8118bca0a8cd688877ec7e7071eaff4dcd53c3</originalsourceid><addsrcrecordid>eNp9kEtLw0AQxxdRsNR-AU8Bz9F9ZjfHUuoDSj3YnpftZtKumIezyaHf3sSI3jzNMP_HwI-QW0bvGaX6IUqWCZVSzlJKGaOpuSAzrmieCimyy9-dm2uyiDEcqGA8EzoXM7Ld1wVg7FxdhPqYvIHvMXTnZHdCcF1MQp2sK8DjKG6hx6ZqsD0Fn6yaqu278bxEfwod-K5HuCFXpfuIsPiZc7J_XO9Wz-nm9elltdyknjFlUge88EroQ6Fk7iR4DUopnWleGsbMwTvqjC8yY4zWo6qpZuDKUha-UMKLObmbeltsPnuInX1veqyHl5bnghspJReDi08uj02MCKVtMVQOz5ZRO6KzEzo7oLPf6KwZQmIKxcFcHwH_qv9JfQFVg3Iy</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2932844423</pqid></control><display><type>article</type><title>Understanding Security Threats in Emerging Neuromorphic Computing Architecture</title><source>Springer Nature - Complete Springer Journals</source><source>ProQuest Central</source><creator>Rajamanikkam, Chidhambaranathan ; JS, Rajesh ; Roy, Sanghamitra ; Chakraborty, Koushik</creator><creatorcontrib>Rajamanikkam, Chidhambaranathan ; JS, Rajesh ; Roy, Sanghamitra ; Chakraborty, Koushik</creatorcontrib><description>Neuromorphic computing marks the beginning of a new era in computing system design, owing to the introduction of complex and unorthodox non-Von Neumann architectures, in conjunction with new post-CMOS nano-ionic devices. These neuromorphic chips are projected to soon become a mainstay platform for a diverse set of applications, ranging from day-to-day rudimentary decision making, to safety critical defense and healthcare management. In this environment, hardware security can no longer take an auxiliary role in system design. In this work, we lay a solid foundation of understanding the broad security implications of emerging memristor-based neuromorphic computing paradigm. We investigate various security loopholes arising from an untrustworthy neuromorphic design environment. We propose, examine and evaluate the security threats arising from— (a) covert hardware Trojans and (b) external attacks exploiting implementation-specific vulnerabilities. Subsequently, we discuss three specific attacks targeting crucial components of the neuromorphic design and demonstrate how the security breaches in the neuromorphic systems can directly impact the end-user experience. Uncovering these security vulnerabilities in the emerging neuromorphic computing paradigm can be instrumental in shaping our design practices.</description><identifier>ISSN: 2509-3428</identifier><identifier>EISSN: 2509-3436</identifier><identifier>DOI: 10.1007/s41635-021-00110-8</identifier><language>eng</language><publisher>Cham: Springer International Publishing</publisher><subject>Algorithms ; Artificial intelligence ; Brain research ; Circuits and Systems ; Computer Hardware ; Confidentiality ; Cybersecurity ; Design ; Engineering ; Hardware ; Information Systems Applications (incl.Internet) ; Neuromorphic computing ; Safety critical ; Software ; Systems and Data Security ; Systems design ; Threat evaluation ; Threats ; User experience</subject><ispartof>Journal of hardware and systems security, 2021-03, Vol.5 (1), p.45-57</ispartof><rights>The Author(s), under exclusive licence to Springer Nature Switzerland AG part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Nature Switzerland AG part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c1158-ae2dc537bd549a4ec7e5557672f8118bca0a8cd688877ec7e7071eaff4dcd53c3</cites><orcidid>0000-0003-3956-8106</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s41635-021-00110-8$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2932844423?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21369,27903,27904,33723,41467,42536,43784,51297</link.rule.ids></links><search><creatorcontrib>Rajamanikkam, Chidhambaranathan</creatorcontrib><creatorcontrib>JS, Rajesh</creatorcontrib><creatorcontrib>Roy, Sanghamitra</creatorcontrib><creatorcontrib>Chakraborty, Koushik</creatorcontrib><title>Understanding Security Threats in Emerging Neuromorphic Computing Architecture</title><title>Journal of hardware and systems security</title><addtitle>J Hardw Syst Secur</addtitle><description>Neuromorphic computing marks the beginning of a new era in computing system design, owing to the introduction of complex and unorthodox non-Von Neumann architectures, in conjunction with new post-CMOS nano-ionic devices. These neuromorphic chips are projected to soon become a mainstay platform for a diverse set of applications, ranging from day-to-day rudimentary decision making, to safety critical defense and healthcare management. In this environment, hardware security can no longer take an auxiliary role in system design. In this work, we lay a solid foundation of understanding the broad security implications of emerging memristor-based neuromorphic computing paradigm. We investigate various security loopholes arising from an untrustworthy neuromorphic design environment. We propose, examine and evaluate the security threats arising from— (a) covert hardware Trojans and (b) external attacks exploiting implementation-specific vulnerabilities. Subsequently, we discuss three specific attacks targeting crucial components of the neuromorphic design and demonstrate how the security breaches in the neuromorphic systems can directly impact the end-user experience. Uncovering these security vulnerabilities in the emerging neuromorphic computing paradigm can be instrumental in shaping our design practices.</description><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Brain research</subject><subject>Circuits and Systems</subject><subject>Computer Hardware</subject><subject>Confidentiality</subject><subject>Cybersecurity</subject><subject>Design</subject><subject>Engineering</subject><subject>Hardware</subject><subject>Information Systems Applications (incl.Internet)</subject><subject>Neuromorphic computing</subject><subject>Safety critical</subject><subject>Software</subject><subject>Systems and Data Security</subject><subject>Systems design</subject><subject>Threat evaluation</subject><subject>Threats</subject><subject>User experience</subject><issn>2509-3428</issn><issn>2509-3436</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp9kEtLw0AQxxdRsNR-AU8Bz9F9ZjfHUuoDSj3YnpftZtKumIezyaHf3sSI3jzNMP_HwI-QW0bvGaX6IUqWCZVSzlJKGaOpuSAzrmieCimyy9-dm2uyiDEcqGA8EzoXM7Ld1wVg7FxdhPqYvIHvMXTnZHdCcF1MQp2sK8DjKG6hx6ZqsD0Fn6yaqu278bxEfwod-K5HuCFXpfuIsPiZc7J_XO9Wz-nm9elltdyknjFlUge88EroQ6Fk7iR4DUopnWleGsbMwTvqjC8yY4zWo6qpZuDKUha-UMKLObmbeltsPnuInX1veqyHl5bnghspJReDi08uj02MCKVtMVQOz5ZRO6KzEzo7oLPf6KwZQmIKxcFcHwH_qv9JfQFVg3Iy</recordid><startdate>20210301</startdate><enddate>20210301</enddate><creator>Rajamanikkam, Chidhambaranathan</creator><creator>JS, Rajesh</creator><creator>Roy, Sanghamitra</creator><creator>Chakraborty, Koushik</creator><general>Springer International Publishing</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><orcidid>https://orcid.org/0000-0003-3956-8106</orcidid></search><sort><creationdate>20210301</creationdate><title>Understanding Security Threats in Emerging Neuromorphic Computing Architecture</title><author>Rajamanikkam, Chidhambaranathan ; JS, Rajesh ; Roy, Sanghamitra ; Chakraborty, Koushik</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1158-ae2dc537bd549a4ec7e5557672f8118bca0a8cd688877ec7e7071eaff4dcd53c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Brain research</topic><topic>Circuits and Systems</topic><topic>Computer Hardware</topic><topic>Confidentiality</topic><topic>Cybersecurity</topic><topic>Design</topic><topic>Engineering</topic><topic>Hardware</topic><topic>Information Systems Applications (incl.Internet)</topic><topic>Neuromorphic computing</topic><topic>Safety critical</topic><topic>Software</topic><topic>Systems and Data Security</topic><topic>Systems design</topic><topic>Threat evaluation</topic><topic>Threats</topic><topic>User experience</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rajamanikkam, Chidhambaranathan</creatorcontrib><creatorcontrib>JS, Rajesh</creatorcontrib><creatorcontrib>Roy, Sanghamitra</creatorcontrib><creatorcontrib>Chakraborty, Koushik</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><jtitle>Journal of hardware and systems security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rajamanikkam, Chidhambaranathan</au><au>JS, Rajesh</au><au>Roy, Sanghamitra</au><au>Chakraborty, Koushik</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Understanding Security Threats in Emerging Neuromorphic Computing Architecture</atitle><jtitle>Journal of hardware and systems security</jtitle><stitle>J Hardw Syst Secur</stitle><date>2021-03-01</date><risdate>2021</risdate><volume>5</volume><issue>1</issue><spage>45</spage><epage>57</epage><pages>45-57</pages><issn>2509-3428</issn><eissn>2509-3436</eissn><abstract>Neuromorphic computing marks the beginning of a new era in computing system design, owing to the introduction of complex and unorthodox non-Von Neumann architectures, in conjunction with new post-CMOS nano-ionic devices. These neuromorphic chips are projected to soon become a mainstay platform for a diverse set of applications, ranging from day-to-day rudimentary decision making, to safety critical defense and healthcare management. In this environment, hardware security can no longer take an auxiliary role in system design. In this work, we lay a solid foundation of understanding the broad security implications of emerging memristor-based neuromorphic computing paradigm. We investigate various security loopholes arising from an untrustworthy neuromorphic design environment. We propose, examine and evaluate the security threats arising from— (a) covert hardware Trojans and (b) external attacks exploiting implementation-specific vulnerabilities. Subsequently, we discuss three specific attacks targeting crucial components of the neuromorphic design and demonstrate how the security breaches in the neuromorphic systems can directly impact the end-user experience. Uncovering these security vulnerabilities in the emerging neuromorphic computing paradigm can be instrumental in shaping our design practices.</abstract><cop>Cham</cop><pub>Springer International Publishing</pub><doi>10.1007/s41635-021-00110-8</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0003-3956-8106</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 2509-3428
ispartof Journal of hardware and systems security, 2021-03, Vol.5 (1), p.45-57
issn 2509-3428
2509-3436
language eng
recordid cdi_proquest_journals_2932844423
source Springer Nature - Complete Springer Journals; ProQuest Central
subjects Algorithms
Artificial intelligence
Brain research
Circuits and Systems
Computer Hardware
Confidentiality
Cybersecurity
Design
Engineering
Hardware
Information Systems Applications (incl.Internet)
Neuromorphic computing
Safety critical
Software
Systems and Data Security
Systems design
Threat evaluation
Threats
User experience
title Understanding Security Threats in Emerging Neuromorphic Computing Architecture
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T17%3A05%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Understanding%20Security%20Threats%20in%20Emerging%20Neuromorphic%20Computing%20Architecture&rft.jtitle=Journal%20of%20hardware%20and%20systems%20security&rft.au=Rajamanikkam,%20Chidhambaranathan&rft.date=2021-03-01&rft.volume=5&rft.issue=1&rft.spage=45&rft.epage=57&rft.pages=45-57&rft.issn=2509-3428&rft.eissn=2509-3436&rft_id=info:doi/10.1007/s41635-021-00110-8&rft_dat=%3Cproquest_cross%3E2932844423%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2932844423&rft_id=info:pmid/&rfr_iscdi=true