Hardware Trojans of Computing-In-Memories: Issues and Methods

Shih Hsu Huang, Wei Che Cheng, Jin Fu Li

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Ensuring the security of memory is crucial in current processor design, where memory is not only used for data storage but also for in-memory computation. In this paper, we explore the security design of embedded memory, focusing on possible hardware Trojans. We provide an overview of existing hardware Trojan designs in the memory mode, covering both SRAM (volatile memory) and STT-MARM (non-volatile memory). Then, we propose an innovative concept for a potential hardware Trojan design in the computing mode, specifically tailored for computing-in-memories. This paper aims to provide insights into the ways in which hardware Trojans exist and the measures we can take to mitigate their impact. These insights can pave the way for exploring detection and prevention methods to enhance memory design security.

Original languageEnglish
Title of host publication36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2023
EditorsLuca Cassano, Mihalis Psarakis, Marcello Traiola, Alberto Bosio
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350315004
DOIs
StatePublished - 2023
Event36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2023 - Juan-Les-Pins, France
Duration: 3 Oct 20235 Oct 2023

Publication series

NameProceedings - IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT
ISSN (Print)2576-1501
ISSN (Electronic)2765-933X

Conference

Conference36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2023
Country/TerritoryFrance
CityJuan-Les-Pins
Period3/10/235/10/23

Keywords

  • Trojan mitigation
  • embedded memory
  • hardware security
  • integrated circuits
  • supply chain

Fingerprint

Dive into the research topics of 'Hardware Trojans of Computing-In-Memories: Issues and Methods'. Together they form a unique fingerprint.

Cite this