[go: up one dir, main page]

Holcomb, 2017 - Google Patents

Nanoscale CMOS Memory-Based Security Primitive Design

Holcomb, 2017

Document ID
9314668897678110647
Author
Holcomb D
Publication year
Publication venue
Security Opportunities in Nano Devices and Emerging Technologies

External Links

Snippet

This chapter considers security primitives based on memory cells. As memories continue to scale near the end of the complementary-metal-oxide-semiconductor roadmap, they become increasingly sensitive to process variations and noise. A second benefit of memory …
Continue reading at www.taylorfrancis.com (other versions)

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C11/00Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
    • G11C11/21Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements
    • G11C11/34Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements using semiconductor devices
    • G11C11/40Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements using semiconductor devices using transistors
    • G11C11/401Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements using semiconductor devices using transistors forming cells needing refreshing or charge regeneration, i.e. dynamic cells
    • G11C11/406Management or control of the refreshing or charge-regeneration cycles
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C29/00Checking stores for correct operation; Subsequent repair; Testing stores during standby or offline operation
    • G11C29/04Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
    • G11C29/08Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
    • G11C29/12Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C29/00Checking stores for correct operation; Subsequent repair; Testing stores during standby or offline operation
    • G11C29/04Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
    • G11C29/50Marginal testing, e.g. race, voltage or current testing
    • G11C29/50016Marginal testing, e.g. race, voltage or current testing of retention
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures

Similar Documents

Publication Publication Date Title
Talukder et al. PreLatPUF: Exploiting DRAM latency variations for generating robust device signatures
Holcomb et al. Bitline PUF: building native challenge-response PUF capability into any SRAM
Tehranipoor et al. DRAM-based intrinsic physically unclonable functions for system-level security and authentication
Holcomb et al. Power-up SRAM state as an identifying fingerprint and source of true random numbers
Tehranipoor et al. Robust hardware true random number generators using DRAM remanence effects
Xiao et al. Bit selection algorithm suitable for high-volume production of SRAM-PUF
Prabhu et al. Extracting device fingerprints from flash memory by exploiting physical variations
Keller et al. Dynamic memory-based physically unclonable function for the generation of unique identifiers and true random numbers
US8590010B2 (en) Retention based intrinsic fingerprint identification featuring a fuzzy algorithm and a dynamic key
Krishna et al. MECCA: A robust low-overhead PUF using embedded memory array
Talukder et al. Exploiting DRAM latency variations for generating true random numbers
Tehranipoor et al. Investigation of DRAM PUFs reliability under device accelerated aging effects
Gao et al. FracDRAM: Fractional values in off-the-shelf DRAM
JP6793044B2 (en) Non-volatile memory device
Wang et al. Aging-resilient SRAM-based true random number generator for lightweight devices
Tang et al. A DRAM based physical unclonable function capable of generating> 10 32 Challenge Response Pairs per 1Kbit array for secure chip authentication
Pandey et al. Noise-resilient SRAM physically unclonable function design for security
Clark et al. Physically unclonable functions using foundry SRAM cells
Roelke et al. Controlling the reliability of SRAM PUFs with directed NBTI aging and recovery
Duan et al. Bti aging-based physical cloning attack on sram puf and the countermeasure
Cicek et al. A new read–write collision-based SRAM PUF implemented on Xilinx FPGAs
Lai et al. Using unstable SRAM bits for physical unclonable function applications on off-the-shelf SRAM
Xu et al. Reliable PUF design using failure patterns from time-controlled power gating
Okumura et al. A 128-bit chip identification generating scheme exploiting SRAM bitcells with failure rate of 4.45× 10− 19
Holcomb Nanoscale CMOS Memory-Based Security Primitive Design