Emerging Non-Volatile Memories (NVMs) such as Magnetic RAM (MRAM), Spin-Transfer Torque RAM (STTRAM), Phase Change Memory (PCM) and Resistive RAM (RRAM) are very promising due to their low (static) power operation, high scalability and high performance. However, these memories bring new threats to data security. In this paper, we investigate their vulnerability against Side Channel Attack (SCA). We assume that the adversary can monitor the supply current of the memory array consumed during read/write operations and recover the secret key of Advanced Encryption Standard (AES) execution. First, we show our analysis of simulation results. Then, we use commercial NVM chips to validate the analysis. We also investigate the effectiveness of encod...
Side-channel attacks constitute a concrete threat to IoT systems-on-a-chip (SoCs). Embedded memories...
Ferroelectric RAM (FRAM) is a promising non-volatile memory technology that is now available in low-...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
Several promising non-volatile memories (NVMs) such as magnetic RAM (MRAM), spin-transfer torque RAM...
While the non-volatile memory (NVM) has often been discussed in the context of alternatives to SRAM ...
Emerging technologies such as Spin-transfer torque magnetic random-access memory (STT-MRAM) are cons...
The emerging non-volatile memory (NVM) devices are currently changing the landscape of computing ...
The unprecedented demand for performance in the latest technologies will ultimately require changes ...
Due to their high-density and near-zero leakage power consumption, non-volatile memories (NVMs) are ...
Abstract. By shrinking the technology and reducing the energy require-ments of integrated circuits, ...
Over past few decades, various ways have been conducted through side channel attacks to steal inform...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
The discrepancy between the abstract model used to reason about the security of computer systems and...
Abstract. Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of...
Side-channel analysis (SCA) is a prominent tool to break mathematically secure cryptographic engines...
Side-channel attacks constitute a concrete threat to IoT systems-on-a-chip (SoCs). Embedded memories...
Ferroelectric RAM (FRAM) is a promising non-volatile memory technology that is now available in low-...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
Several promising non-volatile memories (NVMs) such as magnetic RAM (MRAM), spin-transfer torque RAM...
While the non-volatile memory (NVM) has often been discussed in the context of alternatives to SRAM ...
Emerging technologies such as Spin-transfer torque magnetic random-access memory (STT-MRAM) are cons...
The emerging non-volatile memory (NVM) devices are currently changing the landscape of computing ...
The unprecedented demand for performance in the latest technologies will ultimately require changes ...
Due to their high-density and near-zero leakage power consumption, non-volatile memories (NVMs) are ...
Abstract. By shrinking the technology and reducing the energy require-ments of integrated circuits, ...
Over past few decades, various ways have been conducted through side channel attacks to steal inform...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
The discrepancy between the abstract model used to reason about the security of computer systems and...
Abstract. Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of...
Side-channel analysis (SCA) is a prominent tool to break mathematically secure cryptographic engines...
Side-channel attacks constitute a concrete threat to IoT systems-on-a-chip (SoCs). Embedded memories...
Ferroelectric RAM (FRAM) is a promising non-volatile memory technology that is now available in low-...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...