4 research outputs found
Impact of laser attacks on the switching behavior of RRAM devices
The ubiquitous use of critical and private data in electronic format requires reliable and secure embedded systems for IoT devices. In this context, RRAMs (Resistive Random Access
Memories) arises as a promising alternative to replace current memory technologies. However,
their suitability for this kind of application, where the integrity of the data is crucial, is still under
study. Among the different typology of attacks to recover information of secret data, laser attack
is one of the most common due to its simplicity. Some preliminary works have already addressed
the influence of laser tests on RRAM devices. Nevertheless, the results are not conclusive since
different responses have been reported depending on the circuit under testing and the features of
the test. In this paper, we have conducted laser tests on individual RRAM devices. For the set of
experiments conducted, the devices did not show faulty behaviors. These results contribute to the
characterization of RRAMs and, together with the rest of related works, are expected to pave the way for the development of suitable countermeasures against external attacks.Postprint (published version
Integrated Architecture for Neural Networks and Security Primitives using RRAM Crossbar
This paper proposes an architecture that integrates neural networks (NNs) and
hardware security modules using a single resistive random access memory (RRAM)
crossbar. The proposed architecture enables using a single crossbar to
implement NN, true random number generator (TRNG), and physical unclonable
function (PUF) applications while exploiting the multi-state storage
characteristic of the RRAM crossbar for the vector-matrix multiplication
operation required for the implementation of NN. The TRNG is implemented by
utilizing the crossbar's variation in device switching thresholds to generate
random bits. The PUF is implemented using the same crossbar initialized as an
entropy source for the TRNG. Additionally, the weights locking concept is
introduced to enhance the security of NNs by preventing unauthorized access to
the NN weights. The proposed architecture provides flexibility to configure the
RRAM device in multiple modes to suit different applications. It shows promise
in achieving a more efficient and compact design for the hardware
implementation of NNs and security primitives
Hardware Security Primitives using Passive RRAM Crossbar Array: Novel TRNG and PUF Designs
With rapid advancements in electronic gadgets, the security and privacy
aspects of these devices are significant. For the design of secure systems,
physical unclonable function (PUF) and true random number generator (TRNG) are
critical hardware security primitives for security applications. This paper
proposes novel implementations of PUF and TRNGs on the RRAM crossbar structure.
Firstly, two techniques to implement the TRNG in the RRAM crossbar are
presented based on write-back and 50% switching probability pulse. The
randomness of the proposed TRNGs is evaluated using the NIST test suite. Next,
an architecture to implement the PUF in the RRAM crossbar is presented. The
initial entropy source for the PUF is used from TRNGs, and challenge-response
pairs (CRPs) are collected. The proposed PUF exploits the device variations and
sneak-path current to produce unique CRPs. We demonstrate, through extensive
experiments, reliability of 100%, uniqueness of 47.78%, uniformity of 49.79%,
and bit-aliasing of 48.57% without any post-processing techniques. Finally, the
design is compared with the literature to evaluate its implementation
efficiency, which is clearly found to be superior to the state-of-the-art.Comment: To appear at ASP-DAC 202