2014 IEEE Computer Society Annual Symposium on VLSI 2014
DOI: 10.1109/isvlsi.2014.50
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Analog Designs: A Secure Sense Amplifier Using Memristors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(31 citation statements)
references
References 31 publications
0
31
0
Order By: Relevance
“…The majority of published works on locking consider inserting a lock into the biasing circuitry of the analog IC, such that unless the correct key is applied the analog IC is incorrectly biased, thus resulting in one or more performances residing outside the specification limits. In [16], it is proposed to lock the body-biasing of a matched transistor pair with a lock mechanism that is based on a memristor crossbar, where the key-bits control the programming of the memristors. In [17], it is proposed to replace the transistors used to set the biasing with parallel-connected transistors.…”
Section: Prior Art In Analog Ic Locking and Obfuscationmentioning
confidence: 99%
“…The majority of published works on locking consider inserting a lock into the biasing circuitry of the analog IC, such that unless the correct key is applied the analog IC is incorrectly biased, thus resulting in one or more performances residing outside the specification limits. In [16], it is proposed to lock the body-biasing of a matched transistor pair with a lock mechanism that is based on a memristor crossbar, where the key-bits control the programming of the memristors. In [17], it is proposed to replace the transistors used to set the biasing with parallel-connected transistors.…”
Section: Prior Art In Analog Ic Locking and Obfuscationmentioning
confidence: 99%
“…In [10], the sense amplifiers used to read out the contents of a memory are locked via the body biasing of one of the transistors in their input differential pair. The locking scheme is based on memristors.…”
Section: Previous Work On Analog Ic Lockingmentioning
confidence: 99%
“…All three aforementioned approaches [10]- [12] are vulnerable to removal attacks since a smart attacker can simply remove the obfuscated biasing circuit and replace it with a "fresh" one with no locking mechanism. The attacker does not have to recover the key; it suffices to recover the biases, which typically are not so many.…”
Section: Previous Work On Analog Ic Lockingmentioning
confidence: 99%
“…Its cell size has been shown to be smaller than other NVRAM technologies at 4F 2 (F is the feature size of the technology node) [33]. Additionally, it has been used recently to secure memory designs against unauthorized read accesses [31]. RRAM provides a non-volatile configuration memory for SBs so chips do not have to be reconfigured when the power is cycled, making chip boot-up more secure since there is no need for potentially insecure programming sequences to be sent to the chip.…”
Section: F Error Monitorsmentioning
confidence: 99%