% IMPORTANT: The following is UTF-8 encoded. This means that in the presence
% of non-ASCII characters, it will not work with BibTeX 0.99 or older.
% Instead, you should use an up-to-date BibTeX implementation like “bibtex8” or
% “biber”.
@PHDTHESIS{Staudigl:1005679,
author = {Staudigl, Felix},
othercontributors = {Leupers, Rainer and Krstić, Miloš},
title = {{T}owards trustworthy neuromorphic computing: an analysis
of hardware security and reliability risks},
school = {Rheinisch-Westfälische Technische Hochschule Aachen},
type = {Dissertation},
address = {Aachen},
publisher = {RWTH Aachen University},
reportid = {RWTH-2025-01929},
pages = {1 Online-Ressource : Illustrationen},
year = {2025},
note = {Veröffentlicht auf dem Publikationsserver der RWTH Aachen
University; Dissertation, Rheinisch-Westfälische Technische
Hochschule Aachen, 2025},
abstract = {The von Neumann bottleneck poses a significant barrier,
limiting the computing performance and energy efficiency of
conventional computing systems. Neuromorphic computing seeks
to overcome this bottleneck by leveraging the intrinsic
parallelism and efficiency of the brain-inspired
Computing-in-Memory (CIM) paradigm. Nonetheless, the
immature state of the foundational building block,
memristive devices, introduces substantial challenges in
terms of their reliability and vulnerability to hardware
security threats, necessitating thorough analysis to ensure
the development of secure and reliable computing systems for
future applications. To provide an in-depth investigation of
the reliability concerns, a fault injection platform is
introduced evaluating the robustness of digital CIM
operations. This platform marks a significant contribution
to understanding and mitigating reliability issues in
memristor-based systems by providing a holistic simulation
framework operating on the crossbar and operational level.
Moreover, the work presents NeuroHammer, a novel hardware
security attack exploiting the unique properties of
memristive crossbar arrays to compromise the integrity of
neuromorphic computing systems. This attack underscores the
susceptibility of Resistive Random-Access Memories (ReRAMs)
to hardware security threats, highlighting the critical need
for effective countermeasures. To perform a detailed
reliability evaluation on actual devices, this dissertation
unveils the NeuroBreakoutBoard (NBB)—a highly versatile
instrumentation platform designed to examine the effects of
memristive device nonidealities across various abstraction
levels. The NBB’s ability in executing CIM operations on
real memristive crossbar arrays sets it apart from
previously proposed platforms, emphasizing its essential
role in facilitating thorough analyses for the advancement
of dependable neuromorphic computing platforms. In
conclusion, this thesis delivers a comprehensive evaluation
of memristive devices, spanning from reliability issues to
hardware security threats, thereby paving the way for their
broad adoption and integration into the next era of
computing systems.},
cin = {611910},
ddc = {621.3},
cid = {$I:(DE-82)611910_20140620$},
pnm = {BMBF 16ME0400 - Verbundprojekt: Neuro-inspirierte
Technologien der künstlichen Intelligenz für die
Elektronik der Zukunft - NEUROTEC II - (16ME0400)},
pid = {G:(BMBF)16ME0400},
typ = {PUB:(DE-HGF)11},
doi = {10.18154/RWTH-2025-01929},
url = {https://publications.rwth-aachen.de/record/1005679},
}