The Applications of NVM Technology in Hardware Security

被引:9
|
作者
Yang, Chaofei [1 ]
Liu, Beiye [1 ]
Wang, Yandan [1 ]
Chen, Yiran [1 ]
Li, Hai [1 ]
Zhang, Xian [2 ]
Sun, Guangyu [2 ]
机构
[1] Univ Pittsburgh, Dept Elect & Comp Engn, Pittsburgh, PA 15261 USA
[2] Peking Univ, Ctr Energy Efficient Comp & Applicat, Beijing 100871, Peoples R China
基金
美国国家科学基金会;
关键词
Memristor; spin-transfer torque random access memory; hardware security;
D O I
10.1145/2902961.2903043
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging nonvolatile memory (NVM) technologies have demonstrated great potentials in revolutionizing modern memory hierarchy because of their many promising properties: nanosecond read/write time, small cell area, non-volatility, and easy CMOS integration. It is also found that NVM devices can be leveraged to realize some hardware security solutions efficiently, such as physical unclonable function (PUF) and random number generator (RNG). In this paper, we summarize two of our works about using NVM devices to implement these hardware security features and compare them with conventional designs.
引用
收藏
页码:311 / 316
页数:6
相关论文
共 50 条
  • [1] Memristors for Hardware Security Applications
    Pang, Yachuan
    Gao, Bin
    Lin, Bohan
    Qian, He
    Wu, Huaqiang
    ADVANCED ELECTRONIC MATERIALS, 2019, 5 (09):
  • [2] Hardware Security for and beyond CMOS Technology
    Knechtel, Johann
    PROCEEDINGS OF THE 2020 INTERNATIONAL SYMPOSIUM ON PHYSICAL DESIGN (ISPD'20), 2020, : 75 - 86
  • [3] Applications of Machine Learning in Hardware Security
    Halak, Basel
    Mispan, Mohd Syafiq
    2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, : 212 - 213
  • [4] FLASH E2PROM ROLE IN NVM APPLICATIONS AND TECHNOLOGY
    TSAO, RR
    CHIAO, SH
    TWENTY-THIRD ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2: CONFERENCE RECORD, 1989, : 965 - 969
  • [5] 40 nm UltralowPower ChargeTrap Embedded NVM Technology for IoT Applications
    Kouznetsov, I.
    Ramkumar, K.
    Prabhakar, V.
    Hinh, L.
    Shih, H. M.
    Saha, S.
    Govindaswamy, S.
    Amundson, M.
    Dalton, D.
    Phan, T.
    Luzada, Z.
    Raghavan, V.
    Agrawal, V.
    Donnelly, K.
    Shih, P. C.
    Huang, C. C.
    Lee, K. L.
    Wang, C. H.
    Huang, C. H.
    Lin, C. H.
    Sheu, Y. K.
    2018 IEEE 10TH INTERNATIONAL MEMORY WORKSHOP (IMW), 2018, : 187 - 190
  • [6] Exploiting Lithography Limits for Hardware Security Applications
    Khan, Raihan Sayeed
    Noor, Nafisa
    Jin, Chenglu
    Muneer, Sadid
    Dirisaglik, Faruk
    Cywar, Adam
    Phuong Ha Nguyen
    van Dijk, Marten
    Gokirmak, Ali
    Silva, Helena
    2019 IEEE 19TH INTERNATIONAL CONFERENCE ON NANOTECHNOLOGY (IEEE-NANO 2019), 2019, : 9 - 12
  • [7] RRAM Based Cell for Hardware Security Applications
    Arumi, Daniel
    Manich, Salvador
    Rodriguez-Montanes, Rosa
    2016 1ST IEEE INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2016, : 7 - 12
  • [8] Platforms and Applications in Hardware Security: Trends and Challenges
    Moreno, Edward David
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 289 - 304
  • [9] Hardware Security Assurance in Emerging IoT Applications
    Dofe, Jaya
    Frey, Jonathan
    Yu, Qiaoyan
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 2050 - 2053
  • [10] Hardware Security Applications of Emerging Nonvolatile Memories
    Chen, An
    PROCEEDINGS OF 2015 IEEE 11TH INTERNATIONAL CONFERENCE ON ASIC (ASICON), 2015,