Proceedings of the Great Lakes Symposium on VLSI 2022 2022
DOI: 10.1145/3526241.3530341
|View full text |Cite
|
Sign up to set email alerts
|

Watermarked ReRAM: A Technique to Prevent Counterfeit Memory Chips

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Our proposed technique conceals information in the write (set/reset) time of ReRAM bit cells. The set and reset time increases monotonically with stress levels, making it possible to retain a hidden message and retrieve it through a proper threshold value that separates the stressed and fresh memory cells [8]. The authorized entity performs the proposed information concealing technique in the memory to encode secret information in ReRAM.…”
Section: B Information Hiding Techniquementioning
confidence: 99%
See 4 more Smart Citations
“…Our proposed technique conceals information in the write (set/reset) time of ReRAM bit cells. The set and reset time increases monotonically with stress levels, making it possible to retain a hidden message and retrieve it through a proper threshold value that separates the stressed and fresh memory cells [8]. The authorized entity performs the proposed information concealing technique in the memory to encode secret information in ReRAM.…”
Section: B Information Hiding Techniquementioning
confidence: 99%
“…Each switching operation gradually degrades the resistance of HRS, which is permanent and, thus, cannot be reversed. However, the number of repeated switching cycles, N , used to encode the secret message is determined empirically through cell characterization for given memory chips to ensure proper separation without causing excessive stress [8]. From an encoding perspective, minimizing N is desirable because the encoding time of the secret message is directly proportional to the number of switching cycles.…”
Section: B Information Hiding Techniquementioning
confidence: 99%
See 3 more Smart Citations