The Applications of NVM Technology in Hardware Security

被引:9
|
作者
Yang, Chaofei [1 ]
Liu, Beiye [1 ]
Wang, Yandan [1 ]
Chen, Yiran [1 ]
Li, Hai [1 ]
Zhang, Xian [2 ]
Sun, Guangyu [2 ]
机构
[1] Univ Pittsburgh, Dept Elect & Comp Engn, Pittsburgh, PA 15261 USA
[2] Peking Univ, Ctr Energy Efficient Comp & Applicat, Beijing 100871, Peoples R China
基金
美国国家科学基金会;
关键词
Memristor; spin-transfer torque random access memory; hardware security;
D O I
10.1145/2902961.2903043
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging nonvolatile memory (NVM) technologies have demonstrated great potentials in revolutionizing modern memory hierarchy because of their many promising properties: nanosecond read/write time, small cell area, non-volatility, and easy CMOS integration. It is also found that NVM devices can be leveraged to realize some hardware security solutions efficiently, such as physical unclonable function (PUF) and random number generator (RNG). In this paper, we summarize two of our works about using NVM devices to implement these hardware security features and compare them with conventional designs.
引用
收藏
页码:311 / 316
页数:6
相关论文
共 50 条
  • [21] Emerging Technology-Based Design of Primitives for Hardware Security
    Bi, Yu
    Shamsi, Kaveh
    Yuan, Jiann-Shiun
    Gaillardon, Pierre-Emmanuel
    De Micheli, Giovanni
    Yin, Xunzhao
    Hu, X. Sharon
    Niemier, Michael
    Jin, Yier
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2016, 13 (01)
  • [22] Chip Stacking and Packaging Technology Explorations for Hardware Security (Invited)
    Nagata, Makoto
    2021 ACM/IEEE INTERNATIONAL WORKSHOP ON SYSTEM-LEVEL INTERCONNECT PATHFINDING (SLIP 2021), 2021, : 24 - 24
  • [23] Applications of Visualization Technology for Network Security
    Tang Haina
    Han Chunjing
    Ge Jingguo
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1038 - 1042
  • [24] Development Trends of Embedded NVM Technology
    Tang, TianShen
    Ni, Hao
    Zhao, Zijian
    Zhou, Yao
    2017 IEEE 12TH INTERNATIONAL CONFERENCE ON ASIC (ASICON), 2017, : 6 - 11
  • [25] Pattern Based Synthetic Benchmark Generation for Hardware Security Applications
    Meka, Juneeth Kumar
    Marupureddy, AmarKant
    Vemuri, Ranga
    PROCEEDINGS OF THE 37TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, VLSID 2024 AND 23RD INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, ES 2024, 2024, : 461 - 466
  • [26] VANET Security Framework for Safety Applications Using Trusted Hardware
    Wagan, Asif Ali
    Mughal, Bilal Munir
    Hasbullah, Halabi
    DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS, PT 2, 2011, 189 : 426 - 439
  • [27] The Digital Bidirectional Function as a Hardware Security Primitive: Architecture and Applications
    Xu, Teng
    Potkonjak, Miodrag
    2015 IEEE/ACM INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN (ISLPED), 2015, : 335 - 340
  • [28] Gate-Level Characterization: Foundations and Hardware Security Applications
    Wei, Sheng
    Meguerdichian, Saro
    Potkonjak, Miodrag
    PROCEEDINGS OF THE 47TH DESIGN AUTOMATION CONFERENCE, 2010, : 222 - 227
  • [29] Reset Variability in Phase Change Memory for Hardware Security Applications
    Noor, Nafisa
    Muneer, Sadid
    Khan, Raihan Sayeed
    Gorbenko, Anna
    Adnane, L'Hacene
    Kashem, Md Tashfiq Bin
    Scoggin, Jake
    Dirisaglik, Faruk
    Cywar, Adam
    Gokirmak, Ali
    Silva, Helena
    IEEE TRANSACTIONS ON NANOTECHNOLOGY, 2021, 20 : 75 - 82
  • [30] RRAM Based Random Bit Generation for Hardware Security Applications
    Arumi, Daniel
    Manich, Salvador
    Rodriguez-Montanes, Rosa
    Pehl, Michael
    2016 CONFERENCE ON DESIGN OF CIRCUITS AND INTEGRATED SYSTEMS (DCIS 2016), 2016, : 219 - 224