Security challenges of processing-in-memory systems

MT Arafin, Z Lu - Proceedings of the 2020 on Great Lakes Symposium …, 2020 - dl.acm.org
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 2020dl.acm.org
Emerging memory systems such as resistive random access memory (RRAM), phase-
change memory (PCM), and spin-transfer torque magneto-resistive random access memory
(STT-MRAM) offer unique physical properties useful in designing next-generation
processing in-memory (PIM) circuits and systems. Modified dynamic random access memory
(DRAM) designs are also demonstrating on-chip data processing and bulk data operation
capabilities. However, in-memory computation can fundamentally change the security …
Emerging memory systems such as resistive random access memory (RRAM), phase-change memory (PCM), and spin-transfer torque magneto-resistive random access memory (STT-MRAM) offer unique physical properties useful in designing next-generation processing in-memory (PIM) circuits and systems. Modified dynamic random access memory (DRAM) designs are also demonstrating on-chip data processing and bulk data operation capabilities. However, in-memory computation can fundamentally change the security models and assumptions of existing systems due to several key factors, such as modified system architecture, disparate programming models, side-channel effects, device reliability, hardware Trojans, and malicious perturbations in data processing. Therefore, in this paper, we survey and examine fundamental vulnerabilities arising from processing-in-memory systems. We aim to present the PIM system architects and designers an overview of security issues that can jeopardize the future of in-memory computation.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果