Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Design Considerations for Memristive Crossbar Physical Unclonable Functions

Design Considerations for Memristive Crossbar Physical Unclonable Functions Design Considerations for Memristive Crossbar Physical Unclonable Functions MESBAH UDDIN and MD. BADRUDDOJA MAJUMDER, University of Tennessee, Knoxville KARSTEN BECKMANN, HARIKA MANEM, ZAHIRUDDIN ALAMGIR, and NATHANIEL C. CADY, SUNY Polytechnic Institute, Albany GARRETT S. ROSE, University of Tennessee, Knoxville Hardware security has emerged as a field concerned with issues such as integrated circuit (IC) counterfeiting, cloning, piracy, and reverse engineering. Physical unclonable functions (PUF) are hardware security primitives useful for mitigating such issues by providing hardware-specific fingerprints based on intrinsic process variations within individual IC implementations. As technology scaling progresses further into the nanometer region, emerging nanoelectronic technologies, such as memristors or RRAMs (resistive random-access memory), have become interesting options for emerging computing systems. In this article, using a comprehensive temperature dependent model of an HfOx (hafnium-oxide) memristor, based on experimental measurements, we explore the best region of operation for a memristive crossbar PUF (XbarPUF). The design considered also employs XORing and a column shuffling technique to improve reliability and resilience to machine learning attacks. We present a detailed analysis for the noise margin and discuss the scalability of the XbarPUF structure. Finally, we present results for estimates of area, power, and delay alongside security performance metrics to http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM Journal on Emerging Technologies in Computing Systems (JETC) Association for Computing Machinery

Loading next page...
 
/lp/association-for-computing-machinery/design-considerations-for-memristive-crossbar-physical-unclonable-kiMdMCjF3H

References (42)

Publisher
Association for Computing Machinery
Copyright
Copyright © 2017 by ACM Inc.
ISSN
1550-4832
DOI
10.1145/3094414
Publisher site
See Article on Publisher Site

Abstract

Design Considerations for Memristive Crossbar Physical Unclonable Functions MESBAH UDDIN and MD. BADRUDDOJA MAJUMDER, University of Tennessee, Knoxville KARSTEN BECKMANN, HARIKA MANEM, ZAHIRUDDIN ALAMGIR, and NATHANIEL C. CADY, SUNY Polytechnic Institute, Albany GARRETT S. ROSE, University of Tennessee, Knoxville Hardware security has emerged as a field concerned with issues such as integrated circuit (IC) counterfeiting, cloning, piracy, and reverse engineering. Physical unclonable functions (PUF) are hardware security primitives useful for mitigating such issues by providing hardware-specific fingerprints based on intrinsic process variations within individual IC implementations. As technology scaling progresses further into the nanometer region, emerging nanoelectronic technologies, such as memristors or RRAMs (resistive random-access memory), have become interesting options for emerging computing systems. In this article, using a comprehensive temperature dependent model of an HfOx (hafnium-oxide) memristor, based on experimental measurements, we explore the best region of operation for a memristive crossbar PUF (XbarPUF). The design considered also employs XORing and a column shuffling technique to improve reliability and resilience to machine learning attacks. We present a detailed analysis for the noise margin and discuss the scalability of the XbarPUF structure. Finally, we present results for estimates of area, power, and delay alongside security performance metrics to

Journal

ACM Journal on Emerging Technologies in Computing Systems (JETC)Association for Computing Machinery

Published: Oct 14, 2017

There are no references for this article.