Review of security techniques for memristor computing systems
نویسندگان
چکیده
Neural network (NN) algorithms have become the dominant tool in visual object recognition, natural language processing, and robotics. To enhance computational efficiency of these algorithms, comparison to traditional von Neuman computing architectures, researchers been focusing on memristor systems. A major drawback when using systems today is that, artificial intelligence (AI) era, well-trained NN models are intellectual property and, loaded systems, face theft threats, especially running edge devices. An adversary may steal through advanced attacks such as learning side-channel analysis. In this paper, we review different security techniques for protecting Two threat described based their assumptions regarding adversary’s capabilities: a black-box (BB) model white-box (WB) model. We categorize existing into five classes context models: thwarting (BB), encryption (WB), weight transformation fingerprint embedding (WB). also present cross-comparison limitations techniques. This paper could serve an aid designing secure
منابع مشابه
Memristor nanodevice for unconventional computing: review and applications
A memristor is a two-terminal nanodevice that its properties attract a wide community of researchers from various domains such as physics, chemistry, electronics, computer and neuroscience. The simple structure for manufacturing, small scalability, nonvolatility and potential of using in low power platforms are outstanding characteristics of this emerging nanodevice. In this report, we review a...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملSecurity in Computing Systems
semantics of virtual layers incorrect translation, non-captured but security-relevant aspects “real-world” meaning not expressed unperceived attack possibilities seemingly restricted functionality universality by simulation (identifiable) virtual digital objects represented by bit string unauthorized copying (double spending of coins) limited control over remote sites remote activities only der...
متن کاملSecurity Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Often the model was introduced by the creator of the protocol, in some cases borrowing parameters from the protocol for model parameters. Moreover, the models that are discussed may represent only one aspect of the necessa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Frontiers in electronic materials
سال: 2022
ISSN: ['2673-9895']
DOI: https://doi.org/10.3389/femat.2022.1010613