Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Memristors in the Context of Security: A Brief Meta-Review of the State of the Art

Version 1 : Received: 23 May 2024 / Approved: 23 May 2024 / Online: 23 May 2024 (16:45:57 CEST)

How to cite: Tekles, A.; Mexis, N.; Katzenbeisser, S. Memristors in the Context of Security: A Brief Meta-Review of the State of the Art. Preprints 2024, 2024051555. https://doi.org/10.20944/preprints202405.1555.v1 Tekles, A.; Mexis, N.; Katzenbeisser, S. Memristors in the Context of Security: A Brief Meta-Review of the State of the Art. Preprints 2024, 2024051555. https://doi.org/10.20944/preprints202405.1555.v1

Abstract

Over the last decade, a lot of research has been conducted on memristors. Most of this research focusses on using memristors for Artificial Intelligence (AI) applications and to fabricate non-volatile memory, but also the security aspects of memristors have been examined. The current study summarises and compares five reviews on the security aspects of memristors. These reviews cover two different perspectives: (1) security applications of memristors such as Physical Unclonable Functions (PUFs) or True Random Number Generators (TRNGs), and (2) potential threats when using memristors to train and store neural networks. The comparison of the reviews reveals that different sets of studies are included in the reviews and different characterisations of the studies are provided. This shows that different perspectives are necessary to get a comprehensive overview of the security aspects of memristors. By synthesising the perspectives of different reviews, this study helps to get such an overview.

Keywords

memristors; security; Physical Unclonable Function (PUF); True Random Number Generator (TRNG)

Subject

Computer Science and Mathematics, Hardware and Architecture

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.