2016 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)
Download PDF

Abstract

Spin-Torque Transfer RAM (STTRAM) is a promising candidate for last level cache due to its high density, high endurance and low leakage. Although promising, STTRAM suffers from high write latency and write current. Additionally, the latency and current depends on the polarity of the data being written. These factors introduce security vulnerabilities and expose the cache memory to side channel attacks (SCA). In this paper we propose a SCA model where the adversary can monitor the supply current of the memory array to partially identify the sensitive cache data that is being read or written. We propose a suite of low-cost solutions such as short retention STTRAM, obfuscation of side channel using 1-bit parity and multi-bit random write, and, neutralizing the side channel using constant current write driver to mitigate the attack. Our analysis reveal that the 1-bit parity reduces the number of distinct write current states by 30% for 32-bit word and the current signature is further obfuscated by multi-bit random writes. Constant current write makes it more challenging for the attacker to extract the entire word using a single supply current signature.
Like what you’re reading?
Already a member?Sign In
Member Price
$11
Non-Member Price
$21
Add to CartSign In
Get this article FREE with a new membership!

Related Articles