谷歌浏览器插件
订阅小程序
在清言上使用

Hardware Trojans of Computing-In-Memories: Issues and Methods

Shih-Hsu Huang, Wei-Che Cheng,Jin-Fu Li

2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)(2023)

引用 0|浏览1
暂无评分
摘要
Ensuring the security of memory is crucial in current processor design, where memory is not only used for data storage but also for in-memory computation. In this paper, we explore the security design of embedded memory, focusing on possible hardware Trojans. We provide an overview of existing hardware Trojan designs in the memory mode, covering both SRAM (volatile memory) and STT-MARM (non-volatile memory). Then, we propose an innovative concept for a potential hardware Trojan design in the computing mode, specifically tailored for computing-in-memories. This paper aims to provide insights into the ways in which hardware Trojans exist and the measures we can take to mitigate their impact. These insights can pave the way for exploring detection and prevention methods to enhance memory design security.
更多
查看译文
关键词
embedded memory,hardware security,integrated circuits,supply chain,Trojan mitigation
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要