Understanding Vulnerabilities in ReRAM Devices for Trust in Semiconductor Designs

被引:0
|
作者
Schultz, T. [1 ]
Jha, R. [1 ]
机构
[1] Univ Cincinnati, Dept Elect Engn & Comp Sci, Cincinnati, OH 45221 USA
来源
2017 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON) | 2017年
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
This paper discusses attack vulnerabilities in Resistive Random Access Memory (ReRAM) devices that can be potentially triggered by Trojan circuits. Systematic experiments were performed on Ru/MgO/Ti/W based ReRAM devices in 1R and 1T1R configurations. Our observations indicate that vulnerabilities in ReRAM include destabilization of filament due to current overshoot, local heating, introduction of parasitic capacitances, and glitches in the source voltages. These studies are critical to design more robust ReRAM devices that are immune to hardware attacks.
引用
收藏
页码:338 / 342
页数:5
相关论文
共 50 条
  • [11] Identifying Vulnerabilities in Trust and Reputation Systems
    Gunes, Taha D.
    Long Tran-Thanh
    Norman, Timothy J.
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 308 - 314
  • [12] Stack engineering for ReRAM devices performance improvement
    Wu, Huaqiang
    Li, Xinyi
    Bai, Yue
    Zhang, Ye
    Wu, Minghao
    Yu, Zhiping
    Qian, He
    2014 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2014, : 846 - 849
  • [13] Selector Devices for Cross-point ReRAM
    Kim, Seonghyun
    Lee, Wootae
    Hwang, Hyunsang
    2012 13TH INTERNATIONAL WORKSHOP ON CELLULAR NANOSCALE NETWORKS AND THEIR APPLICATIONS (CNNA), 2012,
  • [14] Review of radiation effects on ReRAM devices and technology
    Gonzalez-Velo, Yago
    Barnaby, Hugh J.
    Kozicki, Michael N.
    SEMICONDUCTOR SCIENCE AND TECHNOLOGY, 2017, 32 (08)
  • [15] A Simple Memristor Model for Neuromorphic ReRAM Devices
    Al Chawa, Mohamad Moner
    Picos, Rodrigo
    Tetzlaff, Ronald
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [16] Camouflage circuitry and programmable cells to secure semiconductor designs during manufacturing Track: Trust in Microelectronics
    Cocchi, Ron
    PROCEEDINGS OF THE 2015 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2015, : 141 - 145
  • [17] Understanding Cloud Computing Vulnerabilities
    Grobauer, Bernd
    Walloschek, Tobias
    Stoecker, Elmar
    IEEE SECURITY & PRIVACY, 2011, 9 (02) : 50 - 57
  • [18] Understanding Linux kernel vulnerabilities
    Alireza Shameli-Sendi
    Journal of Computer Virology and Hacking Techniques, 2021, 17 : 265 - 278
  • [19] Understanding Linux kernel vulnerabilities
    Shameli-Sendi, Alireza
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2021, 17 (04) : 265 - 278
  • [20] Concept of the mobility edge, a detriment toward the understanding of disordered semiconductor devices
    von Roedem, B.
    Applied physics communications, 1994, 13 (3-4): : 177 - 186