当前位置: X-MOL 学术ACM J. Emerg. Technol. Comput. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Hardware Security in Spin-based Computing-in-memory
ACM Journal on Emerging Technologies in Computing Systems ( IF 2.1 ) Pub Date : 2020-07-07 , DOI: 10.1145/3397513
Xueyan Wang 1 , Jienlei Yang 2 , Yinglin Zhao 1 , Xiaotao Jia 1 , Gang Qu 3 , Weisheng Zhao 1
Affiliation  

Computing-in-memory (CIM) is proposed to alleviate the processor-memory data transfer bottleneck in traditional von Neumann architectures, and spintronics-based magnetic memory has demonstrated many facilitation in implementing CIM paradigm. Since hardware security has become one of the major concerns in circuit designs, this article, for the first time, investigates spin-based computing-in-memory (SpinCIM) from a security perspective. We focus on two fundamental questions: (1) How can the new SpinCIM computing paradigm be exploited to enhance hardware security?; (2) What security concerns has this new SpinCIM computing paradigm incurred?

中文翻译:

基于自旋的内存计算中的硬件安全

内存计算 (CIM) 被提出来缓解传统冯诺依曼架构中的处理器-内存数据传输瓶颈,而基于自旋电子学的磁存储器在实现 CIM 范式方面已经证明了许多便利。由于硬件安全已成为电路设计中的主要关注点之一,本文首次从安全角度研究基于自旋的内存计算(SpinCIM)。我们关注两个基本问题:(1) 如何利用新的 SpinCIM 计算范式来增强硬件安全性?(2) 这种新的 SpinCIM 计算范式引发了哪些安全问题?
更新日期:2020-07-07
down
wechat
bug