Holcomb, 2017 - Google Patents
Nanoscale CMOS Memory-Based Security Primitive DesignHolcomb, 2017
- Document ID
- 9314668897678110647
- Author
- Holcomb D
- Publication year
- Publication venue
- Security Opportunities in Nano Devices and Emerging Technologies
External Links
Snippet
This chapter considers security primitives based on memory cells. As memories continue to scale near the end of the complementary-metal-oxide-semiconductor roadmap, they become increasingly sensitive to process variations and noise. A second benefit of memory …
- 230000015654 memory 0 abstract description 61
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C11/00—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
- G11C11/21—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements
- G11C11/34—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements using semiconductor devices
- G11C11/40—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements using semiconductor devices using transistors
- G11C11/401—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements using semiconductor devices using transistors forming cells needing refreshing or charge regeneration, i.e. dynamic cells
- G11C11/406—Management or control of the refreshing or charge-regeneration cycles
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/50—Marginal testing, e.g. race, voltage or current testing
- G11C29/50016—Marginal testing, e.g. race, voltage or current testing of retention
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Talukder et al. | PreLatPUF: Exploiting DRAM latency variations for generating robust device signatures | |
Holcomb et al. | Bitline PUF: building native challenge-response PUF capability into any SRAM | |
Tehranipoor et al. | DRAM-based intrinsic physically unclonable functions for system-level security and authentication | |
Holcomb et al. | Power-up SRAM state as an identifying fingerprint and source of true random numbers | |
Tehranipoor et al. | Robust hardware true random number generators using DRAM remanence effects | |
Xiao et al. | Bit selection algorithm suitable for high-volume production of SRAM-PUF | |
Prabhu et al. | Extracting device fingerprints from flash memory by exploiting physical variations | |
Keller et al. | Dynamic memory-based physically unclonable function for the generation of unique identifiers and true random numbers | |
US8590010B2 (en) | Retention based intrinsic fingerprint identification featuring a fuzzy algorithm and a dynamic key | |
Krishna et al. | MECCA: A robust low-overhead PUF using embedded memory array | |
Talukder et al. | Exploiting DRAM latency variations for generating true random numbers | |
Tehranipoor et al. | Investigation of DRAM PUFs reliability under device accelerated aging effects | |
Gao et al. | FracDRAM: Fractional values in off-the-shelf DRAM | |
JP6793044B2 (en) | Non-volatile memory device | |
Wang et al. | Aging-resilient SRAM-based true random number generator for lightweight devices | |
Tang et al. | A DRAM based physical unclonable function capable of generating> 10 32 Challenge Response Pairs per 1Kbit array for secure chip authentication | |
Pandey et al. | Noise-resilient SRAM physically unclonable function design for security | |
Clark et al. | Physically unclonable functions using foundry SRAM cells | |
Roelke et al. | Controlling the reliability of SRAM PUFs with directed NBTI aging and recovery | |
Duan et al. | Bti aging-based physical cloning attack on sram puf and the countermeasure | |
Cicek et al. | A new read–write collision-based SRAM PUF implemented on Xilinx FPGAs | |
Lai et al. | Using unstable SRAM bits for physical unclonable function applications on off-the-shelf SRAM | |
Xu et al. | Reliable PUF design using failure patterns from time-controlled power gating | |
Okumura et al. | A 128-bit chip identification generating scheme exploiting SRAM bitcells with failure rate of 4.45× 10− 19 | |
Holcomb | Nanoscale CMOS Memory-Based Security Primitive Design |