The Applications of NVM Technology in Hardware Security

被引:9
|
作者
Yang, Chaofei [1 ]
Liu, Beiye [1 ]
Wang, Yandan [1 ]
Chen, Yiran [1 ]
Li, Hai [1 ]
Zhang, Xian [2 ]
Sun, Guangyu [2 ]
机构
[1] Univ Pittsburgh, Dept Elect & Comp Engn, Pittsburgh, PA 15261 USA
[2] Peking Univ, Ctr Energy Efficient Comp & Applicat, Beijing 100871, Peoples R China
基金
美国国家科学基金会;
关键词
Memristor; spin-transfer torque random access memory; hardware security;
D O I
10.1145/2902961.2903043
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging nonvolatile memory (NVM) technologies have demonstrated great potentials in revolutionizing modern memory hierarchy because of their many promising properties: nanosecond read/write time, small cell area, non-volatility, and easy CMOS integration. It is also found that NVM devices can be leveraged to realize some hardware security solutions efficiently, such as physical unclonable function (PUF) and random number generator (RNG). In this paper, we summarize two of our works about using NVM devices to implement these hardware security features and compare them with conventional designs.
引用
收藏
页码:311 / 316
页数:6
相关论文
共 50 条
  • [31] Compromising device security via NVM controller vulnerability
    Skorobogatov, Sergei
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL CONFERENCE ON PHYSICAL ASSURANCE AND INSPECTION ON ELECTRONICS (PAINE), 2020,
  • [32] Weight Programming in DNN Analog Hardware Accelerators in the Presence of NVM Variability
    Mackin, Charles
    Tsai, Hsinyu
    Ambrogio, Stefano
    Narayanan, Pritish
    Chen, An
    Burr, Geoffrey W.
    ADVANCED ELECTRONIC MATERIALS, 2019, 5 (09):
  • [33] Application of Memristors in Hardware Security: A Current State-of-the-Art Technology
    Lv, Shiya
    Liu, Jian
    Geng, Zhaoxin
    ADVANCED INTELLIGENT SYSTEMS, 2021, 3 (01)
  • [34] A Survey on Blockchain Technology Concepts, Applications and Security
    Alqahtani, Asma Mubark
    Algarni, Abdulmohsen
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (02) : 841 - 847
  • [35] Biometric Technology and Ethics: Beyond Security Applications
    Andrea North-Samardzic
    Journal of Business Ethics, 2020, 167 : 433 - 450
  • [36] Recent advances in the Intelligence technology and Security applications
    Dengpan Ye
    International Journal of Computational Intelligence Systems, 2012, 5 : 913 - 913
  • [37] Biometric Technology and Ethics: Beyond Security Applications
    North-Samardzic, Andrea
    JOURNAL OF BUSINESS ETHICS, 2020, 167 (03) : 433 - 450
  • [38] Image fusion technology for security and surveillance applications
    Riley, Tom
    Smith, Moira
    OPTICS AND PHOTONICS FOR COUNTERTERRORISM AND CRIME FIGHTING II, 2006, 6402
  • [39] Scaling of Stacked Gate Technology for embedded NVM
    Shum, D.
    Kakoschke, R.
    Strenz, R.
    2008 9TH INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED-CIRCUIT TECHNOLOGY, VOLS 1-4, 2008, : 827 - 830
  • [40] A Write-Time Based Memristive PUF for Hardware Security Applications
    Rose, Garrett S.
    McDonald, Nathan
    Yan, Lok-Kwong
    Wysocki, Bryant
    2013 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2013, : 830 - 833