Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bryant T. Wysocki is active.

Publication


Featured researches published by Bryant T. Wysocki.


international conference on computer aided design | 2013

A write-time based memristive PUF for hardware security applications

Garrett S. Rose; Nathan R. McDonald; Lok-Kwong Yan; Bryant T. Wysocki

Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are physical unclonable functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends on intrinsic process variations within individual integrated circuits. As process variations become more prevalent due to technology scaling into the nanometer regime, novel nanoelectronic technologies such as memristors become viable options for improved security in emerging integrated circuits. In this paper, we describe a novel memristive PUF (M-PUF) architecture that utilizes variations in the write-time of a memristor as an entropy source. The results presented show strong statistical performance for the M-PUF in terms of uniqueness, uniformity, and bit-aliasing. Additionally, nanoscale M-PUFs are shown to exhibit reduced area utilization as compared to CMOS counterparts.


international symposium on nanoscale architectures | 2010

Compact method for modeling and simulation of memristor devices: ion conductor chalcogenide-based memristor devices

Robinson E. Pino; James W. Bohl; Nathan R. McDonald; Bryant T. Wysocki; Peter J. Rozwood; Kristy A. Campbell; Antonio S. Oblea; Achyut Timilsina

A compact model and simulation methodology for chalcogenide based memristor devices is proposed. From a microprocessor design view point, it is important to be able to simulate large numbers of devices within the integrated circuit architecture in order to speed up reliably the development process. Ideally, device models would accurately describe the characteristic device behavior and would be represented by single-valued equations without requiring the need for recursive or numerically intensive solutions. With this in mind, we have developed an empirical chalcogenide compact memristor model that accurately describes all regions of operations of memristor devices employing single-valued equations.


Proceedings of the IEEE | 2015

Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications

Jeyavijayan Rajendran; Ramesh Karri; James Bradley Wendt; Miodrag Potkonjak; Nathan R. McDonald; Garrett S. Rose; Bryant T. Wysocki

Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high-energy and performance overhead. Further, emerging side-channel and physical attacks can compromise classical security solutions. Hardware security solutions overcome many of these limitations with less energy and performance overhead. Nanoelectronics-based hardware security preserves these advantages while enabling conceptually new security primitives and applications. This tutorial paper shows how one can develop hardware security primitives by exploiting the unique characteristics such as complex device and system models, bidirectional operation, and nonvolatility of emerging nanoelectronic devices. This paper then explains the security capabilities of several emerging nanoelectronic devices: memristors, resistive random-access memory, contact-resistive random-access memory, phase change memories, spin torque-transfer random-access memory, orthogonal spin transfer random access memory, graphene, carbon nanotubes, silicon nanowire field-effect transistors, and nanoelectronic mechanical switches. Further, the paper describes hardware security primitives for authentication, key generation, data encryption, device identification, digital forensics, tamper detection, and thwarting reverse engineering. Finally, the paper summarizes the outstanding challenges in using emerging nanoelectronic devices for security.


international symposium on nanoscale architectures | 2013

Foundations of memristor based PUF architectures

Garrett S. Rose; Nathan R. McDonald; Lok-Kwong Yan; Bryant T. Wysocki; Karen Xu

Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are physical unclonable functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends on intrinsic process variations within individual integrated circuits. As process variations become more prevalent due to technology scaling into the nanometer regime, novel nanoelectronic technologies such as memristors become viable options for improved security in emerging integrated circuits. In this paper, we provide an overview of memristor-based PUF structures and circuits that illustrate the potential for nanoelectronic hardware security solutions.


Applied Physics Letters | 2013

A compact modeling of TiO2-TiO2–x memristor

Lu Zhang; Zhijie Chen; Jianhua Yang; Bryant T. Wysocki; Nathan R. McDonald; Yiran Chen

We developed a SPICE-compatible compact model of TiO2-TiO2– x memristors based on classic ion transportation theory. Our model is shown to simulate important dynamic memristive properties like real-time memristance switching, which are critical in memristor-based analog circuit designs. The model, as well as its analytical approximation, is validated with the experimentally obtained data from real devices. Minor deviations of our model from the measured data are also analyzed and discussed.


asia and south pacific design automation conference | 2013

Hardware security strategies exploiting nanoelectronic circuits

Garrett S. Rose; Jeyavijayan Rajendran; Nathan R. McDonald; Ramesh Karri; Miodrag Potkonjak; Bryant T. Wysocki

Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are physical unclonable functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends on intrinsic process variations within individual integrated circuits. As process variations become more prevalent due to technology scaling into the nanometer regime, novel nanoelectronic technologies such as memristors become viable options for improved security in emerging integrated circuits. In this paper, we provide an overview of memristor based PUF structures and circuits that illustrate the potential for nanoelectronic hardware security solutions.


international symposium on neural networks | 2010

Analysis of dynamic linear and non-linear memristor device models for emerging neuromorphic computing hardware design

Nathan R. McDonald; Robinson E. Pino; Peter J. Rozwood; Bryant T. Wysocki

The value memristor devices offer to the neuromorphic computing hardware design community rests on the ability to provide effective device models that can enable large scale integrated computing architecture application simulations. Therefore, it is imperative to develop practical, functional device models of minimum mathematical complexity for fast, reliable, and accurate computing architecture technology design and simulation. To this end, various device models have been proposed in the literature seeking to characterize the physical electronic and time domain behavioral properties of memristor devices. In this work, we analyze some promising and practical non-quasi-static linear and non-linear memristor device models for neuromorphic circuit design and computing architecture simulation.


Frontiers in Neuroscience | 2016

Design and Analysis of a Neuromemristive Reservoir Computing Architecture for Biosignal Processing

Dhireesha Kudithipudi; Qutaiba Saleh; Cory E. Merkel; James Thesing; Bryant T. Wysocki

Reservoir computing (RC) is gaining traction in several signal processing domains, owing to its non-linear stateful computation, spatiotemporal encoding, and reduced training complexity over recurrent neural networks (RNNs). Previous studies have shown the effectiveness of software-based RCs for a wide spectrum of applications. A parallel body of work indicates that realizing RNN architectures using custom integrated circuits and reconfigurable hardware platforms yields significant improvements in power and latency. In this research, we propose a neuromemristive RC architecture, with doubly twisted toroidal structure, that is validated for biosignal processing applications. We exploit the device mismatch to implement the random weight distributions within the reservoir and propose mixed-signal subthreshold circuits for energy efficiency. A comprehensive analysis is performed to compare the efficiency of the neuromemristive RC architecture in both digital(reconfigurable) and subthreshold mixed-signal realizations. Both Electroencephalogram (EEG) and Electromyogram (EMG) biosignal benchmarks are used for validating the RC designs. The proposed RC architecture demonstrated an accuracy of 90 and 84% for epileptic seizure detection and EMG prosthetic finger control, respectively.


international conference on neural information processing | 2012

The circuit realization of a neuromorphic computing system with memristor-based synapse design

Beiye Liu; Yiran Chen; Bryant T. Wysocki; Tingwen Huang

Conventional CMOS technology is slowly approaching its physical limitations and researchers are increasingly utilizing nanotechnology to both extend CMOS capabilities and to explore potential replacements. Novel memristive systems continue to attract growing attention since their reported physical realization by HP in 2008. Unique characteristics like non-volatility, re-configurability, and analog storage properties make memristors a very promising candidate for the realization of artificial neural systems. In this work, we propose a memristor-based design of bidirectional transmission excitation/inhibition synapses and implement a neuromorphic computing system based on our proposed synapse designs. The robustness of our system is also evaluated by considering the actual manufacturing variability with emphasis on process variation.


ACM Journal on Emerging Technologies in Computing Systems | 2015

Spike-Time-Dependent Encoding for Neuromorphic Processors

Chenyuan Zhao; Bryant T. Wysocki; Yifang Liu; Clare Thiem; Nathan R. McDonald; Yang Yi

This article presents our research towards developing novel and fundamental methodologies for data representation using spike-timing-dependent encoding. Time encoding efficiently maps a signals amplitude information into a spike time sequence that represents the input data and offers perfect recovery for band-limited stimuli. In this article, we pattern the neural activities across multiple timescales and encode the sensory information using time-dependent temporal scales. The spike encoding methodologies for autonomous classification of time-series signatures are explored using near-chaotic reservoir computing. The proposed spiking neuron is compact, low power, and robust. A hardware implementation of these results is expected to produce an agile hardware implementation of time encoding as a signal conditioner for dynamical neural processor designs.

Collaboration


Dive into the Bryant T. Wysocki's collaboration.

Top Co-Authors

Avatar

Nathan R. McDonald

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Clare Thiem

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Dhireesha Kudithipudi

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Cory E. Merkel

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

James W. Bohl

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Jeyavijayan Rajendran

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar

Lok-Kwong Yan

Air Force Research Laboratory

View shared research outputs
Researchain Logo
Decentralizing Knowledge