2021
DOI: 10.3390/jlpea11040036
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive Study of Security and Privacy of Emerging Non-Volatile Memories

Abstract: Several promising non-volatile memories (NVMs) such as magnetic RAM (MRAM), spin-transfer torque RAM (STTRAM), ferroelectric RAM (FeRAM), resistive RAM (RRAM), and phase-change memory (PCM) are being investigated to keep the static leakage within a tolerable limit. These new technologies offer high density and consume zero leakage power and can bridge the gap between processor and memory. The desirable properties of emerging NVMs make them suitable candidates for several applications including replacement of c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 128 publications
0
3
0
Order By: Relevance
“…A resource mapping extension is a one-to-one extension. These approaches offer options to improve the cache's design and guard against attacks [11].…”
Section: A Security Issues In Cache Memorymentioning
confidence: 99%
“…A resource mapping extension is a one-to-one extension. These approaches offer options to improve the cache's design and guard against attacks [11].…”
Section: A Security Issues In Cache Memorymentioning
confidence: 99%
“…In the context of hardware security, logic locking is one of the promising obfuscation methodologies [2]. Security measures come with an expense with extra hardware, and intelligent attackers may decipher the security mechanism by several techniques such as reverse engineering, side-channel analysis [3], etc. This motivates recent research towards exploring novel hardware solutions for use in hardware security.…”
Section: Introductionmentioning
confidence: 99%
“…In the semiconductor sector, insertion of hardware Trojans, reverse engineering attacks, side-channel attacks, piracy of intellectual property (IP), counterfeiting of chips, overbuilding, and others have raised both hardware security threats and financial losses [4]. Recently, the development of various emerging technologies has played a vital role in improving the notion of hardware security [5]- [7]. The main purpose of the emerging technologies is to overcome the fundamental limitations of scaling and power consumption of the CMOS technology.…”
Section: Introductionmentioning
confidence: 99%