M. Majumder, Mesbah Uddin, G. Rose, Jeyavijayan Rajendran
{"title":"为记忆交叉栏内存启用了偷偷路径认证","authors":"M. Majumder, Mesbah Uddin, G. Rose, Jeyavijayan Rajendran","doi":"10.1109/ASIANHOST.2016.7835568","DOIUrl":null,"url":null,"abstract":"The memristive crossbar has emerged as a promising candidate for future memory technologies. In this paper, we explore a sneak path enabled authentication method for memristive crossbar memory. We show that, due to data dependent sneak paths currents, memristive crossbar memory can inherently produce authenticating tags for stored data. A reserved row of memory cells is also used in the proposed protocol which is reconfigured randomly during every write to the memory. We perform a numerical probabilistic analysis for evaluating the security of the proposed protocol for different sizes of crossbar and generated tags. Security is measured in terms of minimum number of trials needed to get a collision among data tags. Simulation results can be extrapolated for predicting the security of the system with larger data tags. Since the memory itself with minimal additional circuitry is used as the tag generating function, the proposed protocol exhibits low overhead compared to more conventional methods.","PeriodicalId":394462,"journal":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Sneak path enabled authentication for memristive crossbar memories\",\"authors\":\"M. Majumder, Mesbah Uddin, G. Rose, Jeyavijayan Rajendran\",\"doi\":\"10.1109/ASIANHOST.2016.7835568\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The memristive crossbar has emerged as a promising candidate for future memory technologies. In this paper, we explore a sneak path enabled authentication method for memristive crossbar memory. We show that, due to data dependent sneak paths currents, memristive crossbar memory can inherently produce authenticating tags for stored data. A reserved row of memory cells is also used in the proposed protocol which is reconfigured randomly during every write to the memory. We perform a numerical probabilistic analysis for evaluating the security of the proposed protocol for different sizes of crossbar and generated tags. Security is measured in terms of minimum number of trials needed to get a collision among data tags. Simulation results can be extrapolated for predicting the security of the system with larger data tags. Since the memory itself with minimal additional circuitry is used as the tag generating function, the proposed protocol exhibits low overhead compared to more conventional methods.\",\"PeriodicalId\":394462,\"journal\":{\"name\":\"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ASIANHOST.2016.7835568\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASIANHOST.2016.7835568","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Sneak path enabled authentication for memristive crossbar memories
The memristive crossbar has emerged as a promising candidate for future memory technologies. In this paper, we explore a sneak path enabled authentication method for memristive crossbar memory. We show that, due to data dependent sneak paths currents, memristive crossbar memory can inherently produce authenticating tags for stored data. A reserved row of memory cells is also used in the proposed protocol which is reconfigured randomly during every write to the memory. We perform a numerical probabilistic analysis for evaluating the security of the proposed protocol for different sizes of crossbar and generated tags. Security is measured in terms of minimum number of trials needed to get a collision among data tags. Simulation results can be extrapolated for predicting the security of the system with larger data tags. Since the memory itself with minimal additional circuitry is used as the tag generating function, the proposed protocol exhibits low overhead compared to more conventional methods.