为记忆交叉栏内存启用了偷偷路径认证

M. Majumder, Mesbah Uddin, G. Rose, Jeyavijayan Rajendran
{"title":"为记忆交叉栏内存启用了偷偷路径认证","authors":"M. Majumder, Mesbah Uddin, G. Rose, Jeyavijayan Rajendran","doi":"10.1109/ASIANHOST.2016.7835568","DOIUrl":null,"url":null,"abstract":"The memristive crossbar has emerged as a promising candidate for future memory technologies. In this paper, we explore a sneak path enabled authentication method for memristive crossbar memory. We show that, due to data dependent sneak paths currents, memristive crossbar memory can inherently produce authenticating tags for stored data. A reserved row of memory cells is also used in the proposed protocol which is reconfigured randomly during every write to the memory. We perform a numerical probabilistic analysis for evaluating the security of the proposed protocol for different sizes of crossbar and generated tags. Security is measured in terms of minimum number of trials needed to get a collision among data tags. Simulation results can be extrapolated for predicting the security of the system with larger data tags. Since the memory itself with minimal additional circuitry is used as the tag generating function, the proposed protocol exhibits low overhead compared to more conventional methods.","PeriodicalId":394462,"journal":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Sneak path enabled authentication for memristive crossbar memories\",\"authors\":\"M. Majumder, Mesbah Uddin, G. Rose, Jeyavijayan Rajendran\",\"doi\":\"10.1109/ASIANHOST.2016.7835568\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The memristive crossbar has emerged as a promising candidate for future memory technologies. In this paper, we explore a sneak path enabled authentication method for memristive crossbar memory. We show that, due to data dependent sneak paths currents, memristive crossbar memory can inherently produce authenticating tags for stored data. A reserved row of memory cells is also used in the proposed protocol which is reconfigured randomly during every write to the memory. We perform a numerical probabilistic analysis for evaluating the security of the proposed protocol for different sizes of crossbar and generated tags. Security is measured in terms of minimum number of trials needed to get a collision among data tags. Simulation results can be extrapolated for predicting the security of the system with larger data tags. Since the memory itself with minimal additional circuitry is used as the tag generating function, the proposed protocol exhibits low overhead compared to more conventional methods.\",\"PeriodicalId\":394462,\"journal\":{\"name\":\"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ASIANHOST.2016.7835568\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASIANHOST.2016.7835568","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

记忆交叉杆已经成为未来存储技术的一个很有前途的候选人。在本文中,我们探索了一种基于偷袭路径的记忆交叉存储器认证方法。我们表明,由于数据依赖的潜行路径电流,记忆交叉棒存储器可以固有地为存储的数据产生身份验证标签。在该协议中还使用了存储单元的保留行,该保留行在每次写入内存时随机重新配置。我们执行数值概率分析,以评估所提出的协议对不同大小的交叉栏和生成的标签的安全性。安全性是根据数据标签之间发生冲突所需的最小试验次数来衡量的。仿真结果可用于预测大数据标签下系统的安全性。由于使用存储器本身和最小的附加电路作为标签生成功能,因此与更传统的方法相比,所提出的协议具有较低的开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Sneak path enabled authentication for memristive crossbar memories
The memristive crossbar has emerged as a promising candidate for future memory technologies. In this paper, we explore a sneak path enabled authentication method for memristive crossbar memory. We show that, due to data dependent sneak paths currents, memristive crossbar memory can inherently produce authenticating tags for stored data. A reserved row of memory cells is also used in the proposed protocol which is reconfigured randomly during every write to the memory. We perform a numerical probabilistic analysis for evaluating the security of the proposed protocol for different sizes of crossbar and generated tags. Security is measured in terms of minimum number of trials needed to get a collision among data tags. Simulation results can be extrapolated for predicting the security of the system with larger data tags. Since the memory itself with minimal additional circuitry is used as the tag generating function, the proposed protocol exhibits low overhead compared to more conventional methods.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信