Projects per year
Abstract
Ensuring the security of memory is crucial in current processor design, where memory is not only used for data storage but also for in-memory computation. In this paper, we explore the security design of embedded memory, focusing on possible hardware Trojans. We provide an overview of existing hardware Trojan designs in the memory mode, covering both SRAM (volatile memory) and STT-MARM (non-volatile memory). Then, we propose an innovative concept for a potential hardware Trojan design in the computing mode, specifically tailored for computing-in-memories. This paper aims to provide insights into the ways in which hardware Trojans exist and the measures we can take to mitigate their impact. These insights can pave the way for exploring detection and prevention methods to enhance memory design security.
Original language | English |
---|---|
Title of host publication | 36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2023 |
Editors | Luca Cassano, Mihalis Psarakis, Marcello Traiola, Alberto Bosio |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
ISBN (Electronic) | 9798350315004 |
DOIs | |
State | Published - 2023 |
Event | 36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2023 - Juan-Les-Pins, France Duration: 3 Oct 2023 → 5 Oct 2023 |
Publication series
Name | Proceedings - IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT |
---|---|
ISSN (Print) | 2576-1501 |
ISSN (Electronic) | 2765-933X |
Conference
Conference | 36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2023 |
---|---|
Country/Territory | France |
City | Juan-Les-Pins |
Period | 3/10/23 → 5/10/23 |
Keywords
- Trojan mitigation
- embedded memory
- hardware security
- integrated circuits
- supply chain
Fingerprint
Dive into the research topics of 'Hardware Trojans of Computing-In-Memories: Issues and Methods'. Together they form a unique fingerprint.Projects
- 1 Not started