6 research outputs found

    Hardware Security Primitives using Passive RRAM Crossbar Array: Novel TRNG and PUF Designs

    Full text link
    With rapid advancements in electronic gadgets, the security and privacy aspects of these devices are significant. For the design of secure systems, physical unclonable function (PUF) and true random number generator (TRNG) are critical hardware security primitives for security applications. This paper proposes novel implementations of PUF and TRNGs on the RRAM crossbar structure. Firstly, two techniques to implement the TRNG in the RRAM crossbar are presented based on write-back and 50% switching probability pulse. The randomness of the proposed TRNGs is evaluated using the NIST test suite. Next, an architecture to implement the PUF in the RRAM crossbar is presented. The initial entropy source for the PUF is used from TRNGs, and challenge-response pairs (CRPs) are collected. The proposed PUF exploits the device variations and sneak-path current to produce unique CRPs. We demonstrate, through extensive experiments, reliability of 100%, uniqueness of 47.78%, uniformity of 49.79%, and bit-aliasing of 48.57% without any post-processing techniques. Finally, the design is compared with the literature to evaluate its implementation efficiency, which is clearly found to be superior to the state-of-the-art.Comment: To appear at ASP-DAC 202

    Integrated Architecture for Neural Networks and Security Primitives using RRAM Crossbar

    Full text link
    This paper proposes an architecture that integrates neural networks (NNs) and hardware security modules using a single resistive random access memory (RRAM) crossbar. The proposed architecture enables using a single crossbar to implement NN, true random number generator (TRNG), and physical unclonable function (PUF) applications while exploiting the multi-state storage characteristic of the RRAM crossbar for the vector-matrix multiplication operation required for the implementation of NN. The TRNG is implemented by utilizing the crossbar's variation in device switching thresholds to generate random bits. The PUF is implemented using the same crossbar initialized as an entropy source for the TRNG. Additionally, the weights locking concept is introduced to enhance the security of NNs by preventing unauthorized access to the NN weights. The proposed architecture provides flexibility to configure the RRAM device in multiple modes to suit different applications. It shows promise in achieving a more efficient and compact design for the hardware implementation of NNs and security primitives

    Opto-mechatronics instrumentation of a specialty optical fiber based optogenetic probe

    No full text
    The neurodegenerative diseases are considered to be incurable as it is caused due to the progressive degradation of the function or death of neuronal cells and loss of structure of neurons. The recent advancement in the research of optogenetics is considered to be of greater significance as it is a new path for researchers to understand the comprehensive function of the brain to find a therapy for neurodegenerative diseases. The discovery of light-gated proteins that can be expressed with neuronal cells for targeted stimulation made optogenetics a powerful tool. Recently, the integration of fiber bundle as a waveguide made it possible for optogenetics to move from in vitro slide studies to the in vivo brain stimulation studies. The galvanometric mirrors in the conventional targeted neuronal stimulation studies were replaced by the Spatial Light Modulators (SLM) in the state of the art optogenetics system due to its superior beam modulation options and response time. However, most of the SLM integrated with the optogenetic systems using coherent fiber bundle are the reflective type which suffers from a major drawback of complex optical configuration. In this dissertation, a high-resolution optogenetic system using Transmissive LC SLM to selectively illuminate the fibers inside the fiber bundle for targeted neuronal stimulation studies was developed. The developed system has several advantages over the reflective SLM system in terms of size, weight and complexity. The individual pixel control of the LC SLM is desirable to understand how the LC SLM can be used with the fiber bundle for neuronal stimulation. Hence a MATLAB based tool was also developed in this work for LC SLM and it was verified experimentally that the developed tool can be used to control the individual LC SLM pixels. Finally, a reference scheme was proposed for the developed system to identify the pixels that need to be activated in the LC SLM for selective illumination of fibers inside the fiber bundle.Master of Science (Green Electronics

    Checklist for percutaneous tracheostomy in critical care

    No full text

    Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond

    Get PDF
    In this work, we propose generic and novel adaptations to the binary Plaintext-Checking (PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen-ciphertext setting, and are fairly generic and easy to mount on a given target, as the attacker requires very minimal information about the target device. However, these attacks have an inherent disadvantage of requiring a few thousand traces to perform full key recovery. This is due to the fact that these attacks typically work by recovering a single bit of information about the secret key per query/trace. In this respect, we propose novel parallel PC oracle based side-channel attacks, which are capable of recovering a generic P number of bits of information about the secret key in a single query/trace. We propose novel techniques to build chosen-ciphertexts so as to efficiently realize a parallel PC oracle for Kyber KEM. We also build a multi-class classifier, which is capable of realizing a practical side-channel based parallel PC oracle with very high success rate. We experimentally validated the proposed attacks (upto P = 10) on the fastest implementation of unprotected Kyber KEM in the pqm4 library. Our experiments yielded improvements in the range of 2.89Ă— and 7.65Ă— in the number of queries, compared to state-of-the-art binary PC oracle attacks, while arbitrarily higher improvements are possible for a motivated attacker, given the generic nature of the proposed attacks. We further conduct a thorough study on applicability to different scenarios, based on the presence/absence of a clone device, and also partial key recovery. Finally, we also show that the proposed attacks are able to achieve the lowest number of queries for key recovery, even for implementations protected with low-cost countermeasures such as shuffling. Our work therefore, concretely demonstrates the power of PC oracle attacks on Kyber KEM, thereby stressing the need for concrete countermeasures such as masking for Kyber and other lattice-based KEMs
    corecore