Design of the RRAM-Based Polymorphic Look-Up Table Scheme

被引:7
|
作者
Cui, Xiaole [1 ]
Li, Xiang [1 ]
Zhang, Miaomiao [1 ]
Cui, Xiaoxin [2 ]
机构
[1] Peking Univ, Key Lab Integrated Microsyst, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] Peking Univ, Inst Microelect, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
Logic gates; Table lookup; Resistance; Foundries; Resists; Reverse engineering; Logic functions; RRAM; polymorphic gate; look-up table;
D O I
10.1109/JEDS.2019.2934471
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The polymorphic gates are the circuit cells that deliver different functions with the different external input, supply voltage or temperature. It is an effective method to resist the reverse engineering attacks, for the attackers cannot distinguish the correct function based on the netlist of the circuit. The researchers have found out that the RRAM based Look-Up Table (LUT) has higher performance and less area, comparing with the CMOS based counterparts. However, the attackers can tell the functions of the previous proposed RRAM based LUTs by measuring the resistance states of the RRAM cells. This work proposes an RRAM based polymorphic gate, which implements 16 basic logic functions with 8 RRAM cells in 4 working cycles. Furthermore, the multi-input LUT scheme is proposed based on the polymorphic gate. It is difficult for the attackers to distinguish the circuit function, because the function of the LUT is determined by the applied voltages and the resistance states of the RRAM devices, and the n-input LUT circuit is implemented with the constant area regardless of the number of inputs.
引用
收藏
页码:949 / 953
页数:5
相关论文
共 50 条
  • [21] Demonstration of a VCSEL-based optoelectronic look-up table
    Irakliotis, LJ
    Stanko, PJ
    Wilmsen, CW
    Mitkas, PA
    IEEE PHOTONICS TECHNOLOGY LETTERS, 1997, 9 (04) : 502 - 504
  • [22] Look-up table based hardware processors for multiparameter analysis
    Mikhalev, DP
    Parfionov, AN
    CZECHOSLOVAK JOURNAL OF PHYSICS, 1998, 48 : 105 - 113
  • [23] Cryptanalysis of dynamic look-up table based chaotic cryptosystems
    Alvarez, G
    Montoya, F
    Romera, M
    Pastor, G
    PHYSICS LETTERS A, 2004, 326 (3-4) : 211 - 218
  • [24] Size reduction of look-up table based print models
    Lippens, Stefaan
    Philips, Wilfried
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 1525 - +
  • [25] An image copyright protection scheme using DCT and a table look-up technique
    Lin, Chi-Nan
    Chang, Chin-Chen
    Tsai, Mien-Tsung
    Journal of Digital Information Management, 2009, 7 (06): : 358 - 364
  • [26] Look-up table based task planning for humanoid robot
    Kim, M
    Cho, K
    Chung, WJ
    You, BJ
    Lee, CW
    INTELLIGENT AUTONOMOUS SYSTEMS 6, 2000, : 265 - 272
  • [27] Fuzzy logic based look-up table controller with generalization
    Albertos, P
    Olivares, M
    Sala, A
    PROCEEDINGS OF THE 2000 AMERICAN CONTROL CONFERENCE, VOLS 1-6, 2000, : 1949 - 1953
  • [28] A Table Look-Up Based Ternary Neural Network Processor
    Suzuki, Yuta
    Soga, Naoto
    Sato, Shimpei
    Nakahara, Hiroki
    2020 IEEE 50TH INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL 2020), 2020, : 188 - 193
  • [29] Optimal look-up table-based data hiding
    Wang, X.
    Zhang, X. -P.
    IET SIGNAL PROCESSING, 2011, 5 (02) : 171 - 179
  • [30] A HARDWARE SECURITY SCHEME FOR RRAM-BASED FPGA
    Chen, Yi-Chung
    Zhang, Wei
    Li, Hai
    2013 23RD INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS (FPL 2013) PROCEEDINGS, 2013,