Mashrafi Kajol, Md Abdullah Al Rumon, Shehjar Sadhu, Suparna Veeturi, Dharma Rane, Dhaval Solanki, Kunal Mankodiya, Wei Lu, Qiaoyan Yu
{"title":"Invisible Leaks: Covert Channel Exploitation in In-Sensor Computing System.","authors":"Mashrafi Kajol, Md Abdullah Al Rumon, Shehjar Sadhu, Suparna Veeturi, Dharma Rane, Dhaval Solanki, Kunal Mankodiya, Wei Lu, Qiaoyan Yu","doi":"10.1145/3716368.3735259","DOIUrl":"10.1145/3716368.3735259","url":null,"abstract":"<p><p>In-sensor computing (ISC) represents a paradigm shift in sensor integration technologies. ISC system combines sensing and processing elements on a single chip, enabling real-time processing and reducing computation latency by eliminating massive data transfer and analog-to-digital conversion. However, due to the high integration of sensors and computation units, ISC could suffer from new security attacks that have not been explored yet. In this work, we investigate a covert channel attack that leverages the analog nature of ISC to showcase the feasibility of security attacks and severe consequences in the context of real applications. We envision that this research paper will inspire more researchers to brainstorm new defense mechanisms for the emerging ISC.</p>","PeriodicalId":521065,"journal":{"name":"Proceedings of the ... ACM Great Lakes Symposium on VLSI. ACM Great Lakes Symposium on VLSI","volume":"2025 ","pages":"397-398"},"PeriodicalIF":0.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12460057/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145188223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Challenges Toward In-Sensor Computing Systems.","authors":"Mashrafi Kajol, Nishanth Chennagouni, Wei Lu, Qiaoyan Yu","doi":"10.1145/3716368.3735176","DOIUrl":"10.1145/3716368.3735176","url":null,"abstract":"<p><p>In-Sensor Computing (ISC) systems emerge as a promising alternative to save energy on massive data transmission, analog-to-digital conversion, and ineffective processing. While the new paradigm shift of ISC systems gains increasing attention, the highly compacted systems could incur new challenges from a hardware security perspective. This work conducts a literature review to highlight the research trend of this topic and then performs comprehensive analyses on the root of security challenges. To the best of our knowledge, this is the first work that compares the security challenges of traditional sensor-involved computing systems and emerging ISC systems. We conduct a comprehensive analysis of ISC's design phases to identify significant vulnerabilities and attack surfaces. Furthermore, new attack scenarios are predicted for board-, chip-, and device-level ISC systems. Three proof-of-concept demos are provided to reveal the consequences of the attacks for three different levels. Our findings emphasize the urgent necessity for sophisticated defense mechanisms and inspire researchers to work on new countermeasure designs against unique hardware security threats in ISC systems.</p>","PeriodicalId":521065,"journal":{"name":"Proceedings of the ... ACM Great Lakes Symposium on VLSI. ACM Great Lakes Symposium on VLSI","volume":"2025 ","pages":"41-48"},"PeriodicalIF":0.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12456945/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145139934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}