2020
DOI: 10.1109/tcad.2019.2937817
|View full text |Cite
|
Sign up to set email alerts
|

Thwarting Replication Attack Against Memristor-Based Neuromorphic Computing System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 30 publications
0
14
0
Order By: Relevance
“…To thwart this kind of attack, Yang et al (2020) proposed to leverage the obsolescence effect of memristor devices to reduce the inference accuracy of the computing systems for unauthorized users. The obsolescence effect of memristor devices causes them to be in the HRS or LRS as a result of read voltage pulses across them.…”
Section: Thwarting Learning Attacksmentioning
confidence: 99%
“…To thwart this kind of attack, Yang et al (2020) proposed to leverage the obsolescence effect of memristor devices to reduce the inference accuracy of the computing systems for unauthorized users. The obsolescence effect of memristor devices causes them to be in the HRS or LRS as a result of read voltage pulses across them.…”
Section: Thwarting Learning Attacksmentioning
confidence: 99%
“…Neuromorphic learning systems based upon memristors are susceptible to learning-based attacks due to the memristors state-based response and various studies focused over this issue. Yang et al [112] presented a model to prevent an attacker from learning the behavior of the memristor-based neuromorphic architecture. The proposed strategy employs the memristor obsolescence effect for users where only legitimate users get complete access to the network.…”
Section: Learning-based Attack Preventionmentioning
confidence: 99%
“…Traditional neuromorphic architectures [103] Synaptic properties [101-102] Neuromorphic architecture design [104] Cognitive architecture design [105] Memristors for neuromorphic chips [116] Anomaly detection [113] Crossbar neuromorphic architecture [78] Hybrid neuromorphic architectures [107] Novel memristors for neurormophic arch. [115] Learning based attack prevention [112] Neuromorphic memristor modeling [111] Secure crossbar architecture [79] TCAM as coprocessor [61] Complex pattern recognition [58] Energy efficient hierarchical TCAM [41] Hierarchical routing table [42] Two-tier prefix matching [43] SRAM-based architecture [55] Multi-pipeline partitioning architecture [44][45] Memory management [47] Optimal routing prefix [48] IP range breakdown [51] Distributed TCAM architecture [46] Prefix address partitioning [52] Routing table partitioning [53] Range expansion using rule compaction [54] Bit vector protocol [56][57] Bloom filter query [59][60]…”
Section: Memristive Neuromorphic Computingmentioning
confidence: 99%
“…These techniques defend the NN architecture at the hardwarelevel. In [19], researchers have demonstrated a technique that defends memristor-based NN architectures by leveraging the memristor's obsolescence effect. The continuous application of voltage causes an increase in memristance, which causes the obsolescence effect in memristors.…”
Section: A Hardware Security Of Neural Networkmentioning
confidence: 99%
“…Later, in [20], researchers proposed a superparamagnetic magnetic tunnel junction (s-MTJs)-based defense mechanism that leverages the thermally-induced telegraphic switching property of s-MTJs to corrupt the weights. This defense is unlike [19], wherein the attacker cannot control the corruption of weights. However, the small retention time of s-MTJs warrants frequent refresh operations, leading to higher energy costs.…”
Section: A Hardware Security Of Neural Networkmentioning
confidence: 99%