Hardware Security in Spin-based Computing-in-memory: Analysis, Exploits, and Mitigation Techniques

ACM Journal on Emerging Technologies in Computing Systems(2020)

引用 3|浏览104
暂无评分
摘要
AbstractComputing-in-memory (CIM) is proposed to alleviate the processor-memory data transfer bottleneck in traditional von Neumann architectures, and spintronics-based magnetic memory has demonstrated many facilitation in implementing CIM paradigm. Since hardware security has become one of the major concerns in circuit designs, this article, for the first time, investigates spin-based computing-in-memory (SpinCIM) from a security perspective. We focus on two fundamental questions: (1) How can the new SpinCIM computing paradigm be exploited to enhance hardware security?; (2) What security concerns has this new SpinCIM computing paradigm incurred?
更多
查看译文
关键词
Computing-in-memory, hardware security, spintronics technology
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要