Security as an Important Ingredient in Neuromorphic Engineering

被引:2
|
作者
Merchant, Farhad [1 ]
机构
[1] Rhein Westfal TH Aachen, Inst Commun Technol & Embedded Syst, Aachen, Germany
来源
2022 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2022) | 2022年
关键词
neuromorphic engineering; brain-inspired computing; emerging technologies; security; DISTURBANCE; MEMORY; PROCESSOR; LOIHI; STATE;
D O I
10.1109/ISVLSI54635.2022.00068
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mimicking brain functionality has been challenging as today's emerging technologies, systems, and the exploitation of systems are inefficient to meet a brain's energy budget. On the other hand, security has become a design goal that sometimes results in a contrasting outcome for the other objectives such as energy, area, and performance. Incorporating security countermeasures can make attaining the desired design goals even more difficult. Therefore, selecting the right components for a neuromorphic platform meets the desired performance and energy goals while maintaining secrecy. Furthermore, the emergence of novel technologies adds another design point to be explored for neuromorphic platform engineering. Firstly, this work reviews the technology for next-generation neuromorphic systems from a security perspective. We discuss various attack vectors and countermeasures for neuromorphic platforms. Secondly, we discuss the applicability of emerging technologies for security primitive designs. The purpose is to identify the right technology adoption for secure neuromorphic platforms. Eventually, we discuss both the aspects of neuromorphic engineering, "secure-by-design" and "design-for-security."
引用
收藏
页码:314 / 319
页数:6
相关论文
共 50 条
  • [31] A systematic review of security requirements engineering
    Mellado, Daniel
    Blanco, Carlos
    Sanchez, Luis E.
    Fernandez-Medina, Eduardo
    COMPUTER STANDARDS & INTERFACES, 2010, 32 (04) : 153 - 165
  • [32] Organizational Barriers to the Implementation of Security Engineering
    Cline, Bryan S.
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 527 - 531
  • [33] Re-engineering enterprise security
    Booker, R
    COMPUTERS & SECURITY, 2006, 25 (01) : 13 - 17
  • [34] Safety, security, and serviceability in road engineering
    Pritchard, Michael S.
    ACCIDENT ANALYSIS AND PREVENTION, 2019, 127 : 172 - 176
  • [35] ENGINEERING FOUNDATIONS FOR THE DETERMINATION OF SECURITY COSTS
    ALVARADO, F
    HU, Y
    RAY, D
    STEVENSON, R
    CASHMAN, E
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1991, 6 (03) : 1175 - 1182
  • [36] Web Engineering Security (WES) Methodology
    Glisson, William Bradley
    Welland, Ray
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 34 : 1359 - 1396
  • [37] E-Commerce Security based on a security engineering life cycle
    Wu, Yanyan
    ACHIEVEMENTS IN ENGINEERING MATERIALS, ENERGY, MANAGEMENT AND CONTROL BASED ON INFORMATION TECHNOLOGY, PTS 1 AND 2, 2011, 171-172 : 640 - 643
  • [38] Cyber Information Security: An Increasingly Important Concern in China
    Guo, Yi-meei
    2016 INTERNATIONAL CONFERENCE ON BUSINESS AND MANAGEMENT (ICBM 2016), 2016, : 1 - 4
  • [39] Utilizing security requirements engineering methods for operational security maintenance purposes
    Abuosba, Khalil
    El-Sheikh, Asim
    Martin, Clemens
    2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 1763 - 1767
  • [40] Thermal switching of TiO2-based RRAM for parameter extraction and neuromorphic engineering
    Milozzi, Alessandro
    Reiser, Daniel
    Drost, Andreas
    Neuner, Thomas
    Tornow, Marc
    Ielmini, Daniele
    ESSCIRC 2022- IEEE 48TH EUROPEAN SOLID STATE CIRCUITS CONFERENCE (ESSCIRC), 2022, : 133 - 136