Secure memristor-based main memory

Sachhidh Kannan, Naghmeh Karimi, Ozgur Sinanoglu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Non-volatile memory devices such as phase change mem-ories and memristors are promising alternatives to SRAM and DRAM main memories as they provide higher den-sity and improved energy effciency. However, non-volatile main memories (NVMM) introduce security vulnerabilities. Sensitive data such as passwords and keys residing in the NVMM will persist and can be probed after power down. We propose sneak-path encryption (SPE), for memristor-based NVMM. SPE exploits the physical parameters, multi-level cell (MLC) capability and the sneak paths in cross-bar memories to encrypt the data stored in memristor-based NVMM. We investigate three attacks on NVMMs and show the resilience of SPE against them. We use a cycle accurate simulator to evaluate the security and performance impact of SPE based NVMM. SPE can secure the NVMM with a latency of 16 cycles and ̃1.5% performance overhead.

Original languageEnglish (US)
Title of host publicationDAC 2014 - 51st Design Automation Conference, Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781479930173
DOIs
StatePublished - Jan 1 2014
Event51st Annual Design Automation Conference, DAC 2014 - San Francisco, CA, United States
Duration: Jun 2 2014Jun 5 2014

Other

Other51st Annual Design Automation Conference, DAC 2014
CountryUnited States
CitySan Francisco, CA
Period6/2/146/5/14

Fingerprint

Memristors
Data storage equipment
Encryption
Cryptography
Path
Cycle
Dynamic random access storage
Password
Static random access storage
Phase Change
Resilience
Vulnerability
Latency
Simulator
Simulators
Attack

ASJC Scopus subject areas

  • Computer Science Applications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modeling and Simulation

Cite this

Kannan, S., Karimi, N., & Sinanoglu, O. (2014). Secure memristor-based main memory. In DAC 2014 - 51st Design Automation Conference, Conference Proceedings [2593212] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1145/2593069.2593212

Secure memristor-based main memory. / Kannan, Sachhidh; Karimi, Naghmeh; Sinanoglu, Ozgur.

DAC 2014 - 51st Design Automation Conference, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2014. 2593212.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kannan, S, Karimi, N & Sinanoglu, O 2014, Secure memristor-based main memory. in DAC 2014 - 51st Design Automation Conference, Conference Proceedings., 2593212, Institute of Electrical and Electronics Engineers Inc., 51st Annual Design Automation Conference, DAC 2014, San Francisco, CA, United States, 6/2/14. https://doi.org/10.1145/2593069.2593212
Kannan S, Karimi N, Sinanoglu O. Secure memristor-based main memory. In DAC 2014 - 51st Design Automation Conference, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc. 2014. 2593212 https://doi.org/10.1145/2593069.2593212
Kannan, Sachhidh ; Karimi, Naghmeh ; Sinanoglu, Ozgur. / Secure memristor-based main memory. DAC 2014 - 51st Design Automation Conference, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2014.
@inproceedings{2731c3d1b2fd40f6ac9fdb4b6e1c1837,
title = "Secure memristor-based main memory",
abstract = "Non-volatile memory devices such as phase change mem-ories and memristors are promising alternatives to SRAM and DRAM main memories as they provide higher den-sity and improved energy effciency. However, non-volatile main memories (NVMM) introduce security vulnerabilities. Sensitive data such as passwords and keys residing in the NVMM will persist and can be probed after power down. We propose sneak-path encryption (SPE), for memristor-based NVMM. SPE exploits the physical parameters, multi-level cell (MLC) capability and the sneak paths in cross-bar memories to encrypt the data stored in memristor-based NVMM. We investigate three attacks on NVMMs and show the resilience of SPE against them. We use a cycle accurate simulator to evaluate the security and performance impact of SPE based NVMM. SPE can secure the NVMM with a latency of 16 cycles and ̃1.5{\%} performance overhead.",
author = "Sachhidh Kannan and Naghmeh Karimi and Ozgur Sinanoglu",
year = "2014",
month = "1",
day = "1",
doi = "10.1145/2593069.2593212",
language = "English (US)",
isbn = "9781479930173",
booktitle = "DAC 2014 - 51st Design Automation Conference, Conference Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Secure memristor-based main memory

AU - Kannan, Sachhidh

AU - Karimi, Naghmeh

AU - Sinanoglu, Ozgur

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Non-volatile memory devices such as phase change mem-ories and memristors are promising alternatives to SRAM and DRAM main memories as they provide higher den-sity and improved energy effciency. However, non-volatile main memories (NVMM) introduce security vulnerabilities. Sensitive data such as passwords and keys residing in the NVMM will persist and can be probed after power down. We propose sneak-path encryption (SPE), for memristor-based NVMM. SPE exploits the physical parameters, multi-level cell (MLC) capability and the sneak paths in cross-bar memories to encrypt the data stored in memristor-based NVMM. We investigate three attacks on NVMMs and show the resilience of SPE against them. We use a cycle accurate simulator to evaluate the security and performance impact of SPE based NVMM. SPE can secure the NVMM with a latency of 16 cycles and ̃1.5% performance overhead.

AB - Non-volatile memory devices such as phase change mem-ories and memristors are promising alternatives to SRAM and DRAM main memories as they provide higher den-sity and improved energy effciency. However, non-volatile main memories (NVMM) introduce security vulnerabilities. Sensitive data such as passwords and keys residing in the NVMM will persist and can be probed after power down. We propose sneak-path encryption (SPE), for memristor-based NVMM. SPE exploits the physical parameters, multi-level cell (MLC) capability and the sneak paths in cross-bar memories to encrypt the data stored in memristor-based NVMM. We investigate three attacks on NVMMs and show the resilience of SPE against them. We use a cycle accurate simulator to evaluate the security and performance impact of SPE based NVMM. SPE can secure the NVMM with a latency of 16 cycles and ̃1.5% performance overhead.

UR - http://www.scopus.com/inward/record.url?scp=84903206424&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84903206424&partnerID=8YFLogxK

U2 - 10.1145/2593069.2593212

DO - 10.1145/2593069.2593212

M3 - Conference contribution

AN - SCOPUS:84903206424

SN - 9781479930173

BT - DAC 2014 - 51st Design Automation Conference, Conference Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -