Understanding Vulnerabilities in ReRAM Devices for Trust in Semiconductor Designs

被引:0
|
作者
Schultz, T. [1 ]
Jha, R. [1 ]
机构
[1] Univ Cincinnati, Dept Elect Engn & Comp Sci, Cincinnati, OH 45221 USA
来源
2017 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON) | 2017年
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
This paper discusses attack vulnerabilities in Resistive Random Access Memory (ReRAM) devices that can be potentially triggered by Trojan circuits. Systematic experiments were performed on Ru/MgO/Ti/W based ReRAM devices in 1R and 1T1R configurations. Our observations indicate that vulnerabilities in ReRAM include destabilization of filament due to current overshoot, local heating, introduction of parasitic capacitances, and glitches in the source voltages. These studies are critical to design more robust ReRAM devices that are immune to hardware attacks.
引用
收藏
页码:338 / 342
页数:5
相关论文
共 50 条
  • [31] Security Vulnerabilities on Implantable Medical Devices
    Longras, Ana
    Oliveira, Henrique
    Paiva, Sara
    2020 15TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2020), 2020,
  • [32] Colluded Applications Vulnerabilities in Android Devices
    Khokhlov, Igor
    Reznik, Leon
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 462 - 469
  • [33] Hardware Devices Security, their Vulnerabilities and Solutions
    Qayyum, Sundus
    Ashraf, Sajjad
    Shafique, Muzammal
    Waheed, Salman
    PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2018, : 439 - 445
  • [34] Vulnerabilities in Hub Architecture IoT Devices
    Visan, Bogdan Alexandru
    Lee, Jiyoon
    Yang, Baijian
    Smith, Anthony H.
    Matson, Eric T.
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 83 - 88
  • [35] Analysis of Security Vulnerabilities for IoT Devices
    Kim, Hee-Hyun
    Yoo, Jinho
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2022, 18 (04): : 489 - 499
  • [36] Understanding and Discovering SQL Injection Vulnerabilities
    Sarhan, Abdullaziz A.
    Farhan, Shehab A.
    Al-Harby, Fahad M.
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 45 - 51
  • [37] Understanding Security Vulnerabilities in File Systems
    Cai, Miao
    Huang, Hao
    Huang, Jian
    APSYS'19: PROCEEDINGS OF THE 10TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, 2019, : 8 - 15
  • [38] Understanding vulnerabilities in software supply chains
    Shen, Yijun
    Gao, Xiang
    Sun, Hailong
    Guo, Yu
    EMPIRICAL SOFTWARE ENGINEERING, 2025, 30 (01)
  • [39] Understanding the Evolution of Android App Vulnerabilities
    Gao, Jun
    Li, Li
    Kong, Pingfan
    Bissyande, Tegawende F.
    Klein, Jacques
    IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (01) : 212 - 230
  • [40] SEMICONDUCTOR DEVICES
    PARKER, RP
    BRITISH JOURNAL OF RADIOLOGY, 1969, 42 (503): : 870 - &