Enhancing embedded SRAM security and error tolerance with hardware CRC and obfuscation

Senwen Kan, Marco Ottavi, Jennifer Dworak

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Abstract

This paper proposes a scalable solution for obstructing and detecting malicious activity as well as erroneous events during mission mode operation of untrusted memories. The approach obfuscates data written into a memory and remaps the location of memory contents in a manner difficult for an attacker to predict, making it harder for a Hardware Trojan to be deterministically triggered or controlled by malicious agents. Simultaneously, the approach aids in the detection of soft errors. To our knowledge, this approach is among the first to reconcile SRAM security with SRAM soft error reliability. Simulation data gathered from a production-worthy silicon development environment confirms the viability of our method.
Original languageEnglish
Title of host publicationProceedings 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)
Place of PublicationPiscataway, NJ
PublisherIEEE
Number of pages4
ISBN (Electronic)978-1-4799-8606-4
ISBN (Print)978-1-5090-0312-9 (USB)
DOIs
Publication statusPublished - 2015
Externally publishedYes
EventIEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2015 - Amherst, United States
Duration: 12 Oct 201514 Oct 2015

Publication series

NameProceedings IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)
PublisherIEEE
Volume2015
ISSN (Print)1550-5774
ISSN (Electronic)2377-7966

Conference

ConferenceIEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2015
Abbreviated titleDFT 2015
Country/TerritoryUnited States
CityAmherst
Period12/10/1514/10/15

Keywords

  • n/a OA procedure

Fingerprint

Dive into the research topics of 'Enhancing embedded SRAM security and error tolerance with hardware CRC and obfuscation'. Together they form a unique fingerprint.

Cite this