{"title":"传感器内计算系统的安全挑战。","authors":"Mashrafi Kajol, Nishanth Chennagouni, Wei Lu, Qiaoyan Yu","doi":"10.1145/3716368.3735176","DOIUrl":null,"url":null,"abstract":"<p><p>In-Sensor Computing (ISC) systems emerge as a promising alternative to save energy on massive data transmission, analog-to-digital conversion, and ineffective processing. While the new paradigm shift of ISC systems gains increasing attention, the highly compacted systems could incur new challenges from a hardware security perspective. This work conducts a literature review to highlight the research trend of this topic and then performs comprehensive analyses on the root of security challenges. To the best of our knowledge, this is the first work that compares the security challenges of traditional sensor-involved computing systems and emerging ISC systems. We conduct a comprehensive analysis of ISC's design phases to identify significant vulnerabilities and attack surfaces. Furthermore, new attack scenarios are predicted for board-, chip-, and device-level ISC systems. Three proof-of-concept demos are provided to reveal the consequences of the attacks for three different levels. Our findings emphasize the urgent necessity for sophisticated defense mechanisms and inspire researchers to work on new countermeasure designs against unique hardware security threats in ISC systems.</p>","PeriodicalId":521065,"journal":{"name":"Proceedings of the ... ACM Great Lakes Symposium on VLSI. ACM Great Lakes Symposium on VLSI","volume":"2025 ","pages":"41-48"},"PeriodicalIF":0.0000,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12456945/pdf/","citationCount":"0","resultStr":"{\"title\":\"Security Challenges Toward In-Sensor Computing Systems.\",\"authors\":\"Mashrafi Kajol, Nishanth Chennagouni, Wei Lu, Qiaoyan Yu\",\"doi\":\"10.1145/3716368.3735176\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>In-Sensor Computing (ISC) systems emerge as a promising alternative to save energy on massive data transmission, analog-to-digital conversion, and ineffective processing. While the new paradigm shift of ISC systems gains increasing attention, the highly compacted systems could incur new challenges from a hardware security perspective. This work conducts a literature review to highlight the research trend of this topic and then performs comprehensive analyses on the root of security challenges. To the best of our knowledge, this is the first work that compares the security challenges of traditional sensor-involved computing systems and emerging ISC systems. We conduct a comprehensive analysis of ISC's design phases to identify significant vulnerabilities and attack surfaces. Furthermore, new attack scenarios are predicted for board-, chip-, and device-level ISC systems. Three proof-of-concept demos are provided to reveal the consequences of the attacks for three different levels. Our findings emphasize the urgent necessity for sophisticated defense mechanisms and inspire researchers to work on new countermeasure designs against unique hardware security threats in ISC systems.</p>\",\"PeriodicalId\":521065,\"journal\":{\"name\":\"Proceedings of the ... ACM Great Lakes Symposium on VLSI. ACM Great Lakes Symposium on VLSI\",\"volume\":\"2025 \",\"pages\":\"41-48\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2025-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12456945/pdf/\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the ... ACM Great Lakes Symposium on VLSI. ACM Great Lakes Symposium on VLSI\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3716368.3735176\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"2025/6/29 0:00:00\",\"PubModel\":\"Epub\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... ACM Great Lakes Symposium on VLSI. ACM Great Lakes Symposium on VLSI","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3716368.3735176","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2025/6/29 0:00:00","PubModel":"Epub","JCR":"","JCRName":"","Score":null,"Total":0}
In-Sensor Computing (ISC) systems emerge as a promising alternative to save energy on massive data transmission, analog-to-digital conversion, and ineffective processing. While the new paradigm shift of ISC systems gains increasing attention, the highly compacted systems could incur new challenges from a hardware security perspective. This work conducts a literature review to highlight the research trend of this topic and then performs comprehensive analyses on the root of security challenges. To the best of our knowledge, this is the first work that compares the security challenges of traditional sensor-involved computing systems and emerging ISC systems. We conduct a comprehensive analysis of ISC's design phases to identify significant vulnerabilities and attack surfaces. Furthermore, new attack scenarios are predicted for board-, chip-, and device-level ISC systems. Three proof-of-concept demos are provided to reveal the consequences of the attacks for three different levels. Our findings emphasize the urgent necessity for sophisticated defense mechanisms and inspire researchers to work on new countermeasure designs against unique hardware security threats in ISC systems.