Sergey Ostrikov
00xnor@gmail.com

Hi, I engineer at the intersection of AI workloads and Memory System Architecture. I take a proactive interest in emerging memory technologies & interfaces (HBM, HBF, LP/DDR5/6, ONFI, NVMe, CXL) and have experience with mature technologies (NOR, NAND, LP/DDR4, FTL). Below are some things I’ve been up to professionally:

Lead Principal Engineer (Memory Solutions), Infineon, 2020-2025, San Jose, CA
In this role: I explored and evaluated storage-centric AI architectures by characterizing computer vision workloads and teasing out memory access patterns
Developed an algorithm to efficiently map workloads onto memories
(neural network) (analog in-memory compute fabric) (demo)
Formulated a nuanced approach for assessing accuracy of neural networks running on analog in-memory compute fabric (demo)
Presented my work at JEDEC

Conference Talks
Graph Compiler for a Weight-Stationary Dataflow
JEDEC Mobile/Client/AI Computing Forum
🇺🇸 San Jose, CA, May 2024
In-memory Computing using SONOS (Non-Volatile Memory)
JEDEC Mobile/Client/AI Computing Forum
🇹🇼 Hsinchu, Taiwan and 🇰🇷 Seoul, S. Korea , May 2023

Resilient Boot (secure boot on processors without eNVM)
IEEE International Conference on Cyber Security and Resilience
💻 Virtual, July 2021

Systems Engineer, Cypress Semiconductor, 2014-2020, San Jose, CA
In this role, I led a feasibility study for a secure memory device, analyzed and improved secure memory IP, and contributed to successful security certification (CAVP, CMVP).
Wrote a C model of a secure NOR Flash device to determine security aspects of the product itself, along with the systems it was intended to operate within (available in the product SDK).
Coded apps, middleware and numerous drivers for demo purposes: MQTT, TLS, TCP/IP, WiFi, ETH, BLE, …

Publications
Resilient Boot
A practical guide for achieving FIPS-certifiable DICE attestation
Secure memories in a connected world (page 30)
How to design FIPS 140-2 cryptographic modules to meet TCG Implicit Identity Based Device Attestation

Patents
Memory device resilient to cyber-attacks and malfunction
Methods for updating firmware with single memory device
Secured communication from within non-volatile memory device
Access-aware flash translation layer on flash memory IC

Contributions to Standards
JEDEC: Serial NOR Security Hardware Abstraction Layer (throughout the doc)
TCG: DICE Attestation Architecture (chapter 7)
TCG: Cyber Resilient Module and Building Block Requirements (storage protection)