Mitigating Device-Level Vulnerabilities in Post-CMOS Machine Learning Accelerators
| dc.contributor.advisor | Salehi, Soheil | |
| dc.contributor.author | Chowdhury, Md Muhtasim Alam | |
| dc.creator | Chowdhury, Md Muhtasim Alam | |
| dc.date.accessioned | 2025-06-30T21:50:39Z | |
| dc.date.available | 2025-06-30T21:50:39Z | |
| dc.date.issued | 2025 | |
| dc.identifier.citation | Chowdhury, Md Muhtasim Alam. (2025). Mitigating Device-Level Vulnerabilities in Post-CMOS Machine Learning Accelerators (Master's thesis, University of Arizona, Tucson, USA). | |
| dc.identifier.uri | http://hdl.handle.net/10150/677737 | |
| dc.description.abstract | Hardware-based acceleration approaches for Machine Learning (ML) workloads have been embracing the significant potential of post-CMOS switching devices to attain reduced footprint and/or energy-efficient execution relative to transistor-based GPU and/or TPU-based accelerator architectures. Meanwhile, the promulgation of fabless IC chip manufacturing paradigms has heightened the hardware security concerns inherent in such approaches. Namely, unauthorized access to various stages of the supply chain may expose significant vulnerabilities that cause malfunctions, including subtle adversarial outcomes via the malicious generation of differentially corrupted output. Whereas the Spin-Orbit Torque Magnetic Tunnel Junction (SOT-MTJ) is a leading spintronic device for use in ML accelerators, as well as holding security tokens, their manufacturing-only security exposures are identified and evaluated herein. The experimental results indicate a novel vulnerability profile whereby an adversary without access to the circuit netlist could differentially influence the behavior of the machine learning application. Specifically, ML recognition outputs can be significantly swayed via a global modification of oxide thickness (Tox) resulting in bit-flips of the weights in the crossbar array, thus corrupting the recognition of selected digits in MNIST dataset differentially creating an opportunity for an adversary. With just 0.05% of bits in crossbar having a flipped resistance state, digits ‘4’ and ‘5’ show highest overall error rates and digit ‘9’ exhibit the lowest impact, with recognition accuracy of digits ‘2’, ‘3’, and ‘8’ unaffected by changing the oxide thickness of SOT-MTJs uniformly from 0.75 nm to 1.2 nm without modifying the netlist nor even having access to the circuit design itself. Exposures and mitigation approaches to such novel and potentially damaging manufacturing-side intrusions are identified, postulated and quantitatively assessed. In conclusion, this thesis showcases the potential of SOT-MRAM process variation to trigger stealthy, application-impacting bitflips in ML accelerators. Early-stage protection against physical-level threats ensures post-silicon ML accelerators remain robust and trustworthy in future AI-enabled systems. | |
| dc.language.iso | en | |
| dc.publisher | The University of Arizona. | |
| dc.rights | Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction, presentation (such as public display or performance) of protected items is prohibited except with permission of the author. | |
| dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | |
| dc.subject | Emerging Switching Devices | |
| dc.subject | Hardware Supply Chain Security | |
| dc.subject | Machine Learning Accelerators | |
| dc.subject | Semiconductor Fabrication | |
| dc.subject | SOT-MRAM | |
| dc.title | Mitigating Device-Level Vulnerabilities in Post-CMOS Machine Learning Accelerators | |
| dc.type | text | |
| dc.type | Electronic Thesis | |
| thesis.degree.grantor | University of Arizona | |
| thesis.degree.level | masters | |
| dc.contributor.committeemember | Satam, Pratik | |
| dc.contributor.committeemember | Roveda, Janet Meiling | |
| thesis.degree.discipline | Graduate College | |
| thesis.degree.discipline | Electrical & Computer Engineering | |
| thesis.degree.name | M.S. | |
| refterms.dateFOA | 2025-06-30T21:50:39Z |
