首页> 外文会议>IEEE International Symposium on Circuits and Systems >A Secure Data-Toggling SRAM for Confidential Data Protection
【24h】

A Secure Data-Toggling SRAM for Confidential Data Protection

机译:用于机密数据保护的安全数据触发SRAM

获取原文

摘要

We study the security feature of static random access memory (SRAM) against the data imprinting attack and provide a solution to protect the SRAM from this attack. There are four main contributions in this paper. First, the negative-bias temperature-instability (NBTI) degradation of PMOS transistors in the conventional SRAM cell that causes the data imprinting effect is explained. Second, the data imprinting effect that leaks the stored information in the conventional SRAM cell is investigated. Third, a novel low transistor-count transmission-gate-based master-slave SRAM cell is proposed to periodically toggle the stored data for reducing the data imprinting effect. Fourth, an efficient imprinting analysis flow is proposed to evaluate the proposed data-toggling SRAM for quantifying the data imprinting effect. Based on a 65-nm CMOS process, we implement and prototype the proposed 1k-byte data-toggling SRAM design. We perform our imprinting analysis flow on various SRAM ICs and benchmark our proposed data-toggling SRAM IC against the non-toggling SRAM IC and a commercial Lyontek SRAM IC. From the measurement results, the non-toggling SRAM and Lyontek SRAM suffer from 60% and 81% data imprinting effects, respectively, whereas our data-toggling SRAM has only 11% data imprinting effect (at 160-kHz toggling frequency). The data-toggling SRAM could switch between high security (< 5% data imprinting effect) high power mode for hardware security applications and low power (< 0.1mW) low security mode for power-saving applications. Particularly, our data-toggling SRAM could feature as low as ∼1% data imprinting effect when increasing the toggling frequency to 1.6 MHz by compromising the power dissipation. Using the image analysis flow, the stored information is revealed in both the non-toggling and Lyontek SRAM ICs but is well protected in the proposed data-toggling SRAM IC.
机译:我们研究了静态随机存取存储器(SRAM)抵御数据烙印攻击的安全性,并提供了一种保护SRAM免受这种攻击的解决方案。本文有四个主要贡献。首先,说明引起数据刻印效果的常规SRAM单元中的PMOS晶体管的负偏压温度不稳定性(NBTI)降低。其次,研究了泄漏传统SRAM单元中存储的信息的数据压印效果。第三,提出一种新型的基于低晶体管数的基于传输门的主从SRAM单元,以周期性地切换存储的数据,以降低数据压印效果。第四,提出了一种有效的压印分析流程,以评估所提出的数据触发型SRAM,以量化数据压印效果。基于65纳米CMOS工艺,我们实现了拟议的1k字节数据触发SRAM设计并进行了原型设计。我们在各种SRAM IC上执行印迹分析流程,并针对非触发SRAM IC和商用Lyontek SRAM IC来对拟议的数据触发SRAM IC进行基准测试。从测量结果来看,非触发SRAM和Lyontek SRAM分别遭受60%和81%的数据压印效果,而我们的数据触发SRAM仅具有11%的数据压印效果(在160kHz触发频率下)。触发数据的SRAM可以在硬件安全应用的高安全性(<5%数据打印效果)高功率模式与节电应用的低功率(<0.1mW)低安全模式之间切换。特别是,当通过降低功耗将切换频率提高到1.6 MHz时,我们的数据切换SRAM可能具有低至约1%的数据压印效果。使用图像分析流程,可以在非触发式和Lyontek SRAM IC中显示存储的信息,但是在建议的数据触发SRAM IC中可以很好地保护存储的信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号