Emerging Threats and Countermeasures in Neuromorphic Systems: A Survey

πŸ“… 2026-01-23
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
This work addresses emerging security threats in neuromorphic systems arising from brain-inspired architectures and memristive devices, particularly side-channel attacks and privacy breaches stemming from asynchronous event-driven mechanisms and stochastic device behavior. It presents the first systematic survey of security challenges in this domain and proposes a holistic hardware-software co-design framework that integrates spiking neural networks, memristor-based hardware, physically unclonable functions (PUFs), and true random number generators (TRNGs) for comprehensive security evaluation. Furthermore, the study introduces a trustworthy neuromorphic hardware design paradigm that balances energy efficiency with robust protection. By mapping the threat landscape of neuromorphic computing, this research establishes both theoretical foundations and practical guidelines for developing intrinsically secure, high-performance next-generation brain-inspired architectures.

Technology Category

Application Category

πŸ“ Abstract
Neuromorphic computing mimics brain-inspired mechanisms through spiking neurons and energy-efficient processing, offering a pathway to efficient in-memory computing (IMC). However, these advancements raise critical security and privacy concerns. As the adoption of bio-inspired architectures and memristive devices increases, so does the urgency to assess the vulnerability of these emerging technologies to hardware and software attacks. Emerging architectures introduce new attack surfaces, particularly due to asynchronous, event-driven processing and stochastic device behavior. The integration of memristors into neuromorphic hardware and software implementations in spiking neural networks offers diverse possibilities for advanced computing architectures, including their role in security-aware applications. This survey systematically analyzes the security landscape of neuromorphic systems, covering attack methodologies, side-channel vulnerabilities, and countermeasures. We focus on both hardware and software concerns relevant to spiking neural networks (SNNs) and hardware primitives, such as Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) for cryptographic and secure computation applications. We approach this analysis from diverse perspectives, from attack methodologies to countermeasure strategies that integrate efficiency and protection in brain-inspired hardware. This review not only maps the current landscape of security threats but provides a foundation for developing secure and trustworthy neuromorphic architectures.
Problem

Research questions and friction points this paper is trying to address.

neuromorphic systems
security threats
spiking neural networks
memristive devices
side-channel vulnerabilities
Innovation

Methods, ideas, or system contributions that make the work stand out.

neuromorphic computing
spiking neural networks
memristive devices
hardware security
Physical Unclonable Functions
πŸ”Ž Similar Papers
No similar papers found.
P
Pablo Sorrentino
Faculty of Science and Engineering, University of Groningen, Netherlands
S
S. Picek
Faculty of Electrical Engineering and Computing, University of Zagreb, Croatia and Radboud University, The Netherlands
Ihsen Alouani
Ihsen Alouani
CSIT, Queen's University Belfast, UK
ML/AI Security & PrivacySystems Security
Nikolaos Athanasios Anagnostopoulos
Nikolaos Athanasios Anagnostopoulos
University of Passau
Hardware SecurityPhysical SecurityIoT & Embedded SystemsPUFs & TRNGsChaos-Based Cryptography
Francesco Regazzoni
Francesco Regazzoni
University of Amsterdam and UniversitΓ  della Svizzera italiana
L
L. Batina
Digital Security (DiS) Group, Radboud University, Netherlands
T
Tamalika Banerjee
Faculty of Science and Engineering, University of Groningen, Netherlands
Fatih Turkmen
Fatih Turkmen
Associate Professor, Computer Science, Bernoulli Institute, University of Groningen
PrivacyML Security/PrivacyFuzz TestingAccess ControlBlockchain/DLTs