Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Linked to FindBook
Google Book
Amazon
博客來
Security and Resilience of Non-Volatile Memories Based on In-Memory Computing.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security and Resilience of Non-Volatile Memories Based on In-Memory Computing./
Author:
Ensan, Sina Sayyah.
Description:
1 online resource (147 pages)
Notes:
Source: Dissertations Abstracts International, Volume: 84-02, Section: B.
Contained By:
Dissertations Abstracts International84-02B.
Subject:
Numerical analysis. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=29276593click for full text (PQDT)
ISBN:
9798841577898
Security and Resilience of Non-Volatile Memories Based on In-Memory Computing.
Ensan, Sina Sayyah.
Security and Resilience of Non-Volatile Memories Based on In-Memory Computing.
- 1 online resource (147 pages)
Source: Dissertations Abstracts International, Volume: 84-02, Section: B.
Thesis (Ph.D.)--The Pennsylvania State University, 2022.
Includes bibliographical references
Von-Neumann computing has separated computing and storage units, and this leads to incapability to meet the challenges introduced in big data era. Transistor scaling has offered faster processing and storage units over years but the transfer bus between these two units (Von-Neumann bottleneck) is dominating power, energy consumption, and performance of the Von-Neumann computing model. In-Memory Computing (IMC) is one of the most promising architectures that can solve this challenge locally. The basic idea of IMC is to infuse computing abilities into the storage elements. IMC is achievable by using Non-Volatile Memories (NVMs) such as Spin-Transfer Torque RAM (STTRAM), Magnetic RAM (MRAM), Phase Change Memory (PCM), and Resistive RAM (RRAM). RRAM characteristics such as low power consumption, fast operation, and high integration density (4f2 footprint in crossbar architecture) make it a suitable candidate for NVM application. However, on the other hand, RRAM characteristics such as high and asymmetric read/write current, retention time, and defects during fabrication bring new threats to security and resiliency of the IMC circuits. IMC circuits will be a huge part of future chips and are believed to become ubiquitous in future computing devices. Therefore, it is very important to investigate their security against adversaries and resiliency against defects. Note that, the challenges for security and resiliency of compute-capable NVMs is completely different from their storage counterpart. In this work, we have implemented two IMC systems which first one is capable of performing Floating Point (FP) arithmetic operations and the other one is a first order linear Partial Differential Equation (PDE) solver. Later on in this work, we investigate the possible adversary attacks against two general purpose IMC architectures namely Memristor Aided Logic (MAGIC) and Dynamic Computing In-Memory (DCIM) and then we propose countermeasure approaches to obfuscate the implemented function from the adversary. Furthermore, we propose approaches to meet the challenges arising from defects in RRAMs' fabrication. These approaches make sure that IMC architecture can work if there are some RRAMs Stuck At Fault (SAF).
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2023
Mode of access: World Wide Web
ISBN: 9798841577898Subjects--Topical Terms:
517751
Numerical analysis.
Index Terms--Genre/Form:
542853
Electronic books.
Security and Resilience of Non-Volatile Memories Based on In-Memory Computing.
LDR
:03501nmm a2200349K 4500
001
2356246
005
20230612072247.5
006
m o d
007
cr mn ---uuuuu
008
241011s2022 xx obm 000 0 eng d
020
$a
9798841577898
035
$a
(MiAaPQ)AAI29276593
035
$a
(MiAaPQ)PennState_23984sxs2541
035
$a
AAI29276593
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Ensan, Sina Sayyah.
$3
3696724
245
1 0
$a
Security and Resilience of Non-Volatile Memories Based on In-Memory Computing.
264
0
$c
2022
300
$a
1 online resource (147 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertations Abstracts International, Volume: 84-02, Section: B.
500
$a
Advisor: Ghosh, Swaroop.
502
$a
Thesis (Ph.D.)--The Pennsylvania State University, 2022.
504
$a
Includes bibliographical references
520
$a
Von-Neumann computing has separated computing and storage units, and this leads to incapability to meet the challenges introduced in big data era. Transistor scaling has offered faster processing and storage units over years but the transfer bus between these two units (Von-Neumann bottleneck) is dominating power, energy consumption, and performance of the Von-Neumann computing model. In-Memory Computing (IMC) is one of the most promising architectures that can solve this challenge locally. The basic idea of IMC is to infuse computing abilities into the storage elements. IMC is achievable by using Non-Volatile Memories (NVMs) such as Spin-Transfer Torque RAM (STTRAM), Magnetic RAM (MRAM), Phase Change Memory (PCM), and Resistive RAM (RRAM). RRAM characteristics such as low power consumption, fast operation, and high integration density (4f2 footprint in crossbar architecture) make it a suitable candidate for NVM application. However, on the other hand, RRAM characteristics such as high and asymmetric read/write current, retention time, and defects during fabrication bring new threats to security and resiliency of the IMC circuits. IMC circuits will be a huge part of future chips and are believed to become ubiquitous in future computing devices. Therefore, it is very important to investigate their security against adversaries and resiliency against defects. Note that, the challenges for security and resiliency of compute-capable NVMs is completely different from their storage counterpart. In this work, we have implemented two IMC systems which first one is capable of performing Floating Point (FP) arithmetic operations and the other one is a first order linear Partial Differential Equation (PDE) solver. Later on in this work, we investigate the possible adversary attacks against two general purpose IMC architectures namely Memristor Aided Logic (MAGIC) and Dynamic Computing In-Memory (DCIM) and then we propose countermeasure approaches to obfuscate the implemented function from the adversary. Furthermore, we propose approaches to meet the challenges arising from defects in RRAMs' fabrication. These approaches make sure that IMC architecture can work if there are some RRAMs Stuck At Fault (SAF).
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2023
538
$a
Mode of access: World Wide Web
650
4
$a
Numerical analysis.
$3
517751
650
4
$a
Failure.
$3
3561225
650
4
$a
Arrays.
$3
3681398
650
4
$a
Logic.
$3
529544
650
4
$a
Applied mathematics.
$3
2122814
650
4
$a
Mathematics.
$3
515831
655
7
$a
Electronic books.
$2
lcsh
$3
542853
690
$a
0395
690
$a
0364
690
$a
0405
710
2
$a
ProQuest Information and Learning Co.
$3
783688
710
2
$a
The Pennsylvania State University.
$3
699896
773
0
$t
Dissertations Abstracts International
$g
84-02B.
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=29276593
$z
click for full text (PQDT)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9478602
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login