Review of security techniques for memristor computing systems

نویسندگان

چکیده

Neural network (NN) algorithms have become the dominant tool in visual object recognition, natural language processing, and robotics. To enhance computational efficiency of these algorithms, comparison to traditional von Neuman computing architectures, researchers been focusing on memristor systems. A major drawback when using systems today is that, artificial intelligence (AI) era, well-trained NN models are intellectual property and, loaded systems, face theft threats, especially running edge devices. An adversary may steal through advanced attacks such as learning side-channel analysis. In this paper, we review different security techniques for protecting Two threat described based their assumptions regarding adversary’s capabilities: a black-box (BB) model white-box (WB) model. We categorize existing into five classes context models: thwarting (BB), encryption (WB), weight transformation fingerprint embedding (WB). also present cross-comparison limitations techniques. This paper could serve an aid designing secure

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Memristor nanodevice for unconventional computing: review and applications

A memristor is a two-terminal nanodevice that its properties attract a wide community of researchers from various domains such as physics, chemistry, electronics, computer and neuroscience. The simple structure for manufacturing, small scalability, nonvolatility and potential of using in low power platforms are outstanding characteristics of this emerging nanodevice. In this report, we review a...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Security in Computing Systems

semantics of virtual layers incorrect translation, non-captured but security-relevant aspects “real-world” meaning not expressed unperceived attack possibilities seemingly restricted functionality universality by simulation (identifiable) virtual digital objects represented by bit string unauthorized copying (double spending of coins) limited control over remote sites remote activities only der...

متن کامل

Security Requirements for RFID Computing Systems

Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Often the model was introduced by the creator of the protocol, in some cases borrowing parameters from the protocol for model parameters. Moreover, the models that are discussed may represent only one aspect of the necessa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Frontiers in electronic materials

سال: 2022

ISSN: ['2673-9895']

DOI: https://doi.org/10.3389/femat.2022.1010613