M. Majumder, Mesbah Uddin, G. Rose, Jeyavijayan Rajendran
{"title":"Sneak path enabled authentication for memristive crossbar memories","authors":"M. Majumder, Mesbah Uddin, G. Rose, Jeyavijayan Rajendran","doi":"10.1109/ASIANHOST.2016.7835568","DOIUrl":null,"url":null,"abstract":"The memristive crossbar has emerged as a promising candidate for future memory technologies. In this paper, we explore a sneak path enabled authentication method for memristive crossbar memory. We show that, due to data dependent sneak paths currents, memristive crossbar memory can inherently produce authenticating tags for stored data. A reserved row of memory cells is also used in the proposed protocol which is reconfigured randomly during every write to the memory. We perform a numerical probabilistic analysis for evaluating the security of the proposed protocol for different sizes of crossbar and generated tags. Security is measured in terms of minimum number of trials needed to get a collision among data tags. Simulation results can be extrapolated for predicting the security of the system with larger data tags. Since the memory itself with minimal additional circuitry is used as the tag generating function, the proposed protocol exhibits low overhead compared to more conventional methods.","PeriodicalId":394462,"journal":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASIANHOST.2016.7835568","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
The memristive crossbar has emerged as a promising candidate for future memory technologies. In this paper, we explore a sneak path enabled authentication method for memristive crossbar memory. We show that, due to data dependent sneak paths currents, memristive crossbar memory can inherently produce authenticating tags for stored data. A reserved row of memory cells is also used in the proposed protocol which is reconfigured randomly during every write to the memory. We perform a numerical probabilistic analysis for evaluating the security of the proposed protocol for different sizes of crossbar and generated tags. Security is measured in terms of minimum number of trials needed to get a collision among data tags. Simulation results can be extrapolated for predicting the security of the system with larger data tags. Since the memory itself with minimal additional circuitry is used as the tag generating function, the proposed protocol exhibits low overhead compared to more conventional methods.