Matches in SemOpenAlex for { <https://semopenalex.org/work/W3208270918> ?p ?o ?g. }
- W3208270918 endingPage "2051" @default.
- W3208270918 startingPage "2040" @default.
- W3208270918 abstract "In-memory computing (IMC) architectures provide a much needed solution to energy-efficiency barriers posed by Von-Neumann computing. The functions implemented in such in-memory architectures are often proprietary and constitute confidential intellectual property (IP). Our studies indicate that IMC architectures implemented using resistive RAM (RRAM) are susceptible to side channel attack (SCA). Unlike the conventional SCAs that are aimed to leak private keys from cryptographic implementations, SCA on IMC for reverse engineering (SCARE) can reveal the sensitive IP implemented within the memory through power/timing side channels. Therefore, the adversary does not need to perform invasive reverse engineering (RE) to unlock the functionality. We demonstrate SCARE by taking recent IMC architectures, such as dynamic computing in memory (DCIM) and memristor-aided logic (MAGIC) as test cases. Simulation results indicate that AND, OR, and NOR gates (which are the building blocks of complex functions) yield distinct power and timing signatures based on the number of inputs, making them vulnerable to SCA. We show that adversary can use templates (using foundry-calibrated simulations or fabricating known functions in test chips) and analysis to identify the structure of the implemented function by testing a limited number of patterns. We also propose countermeasures, such as redundant inputs and expansion of literals. Redundant inputs can mask the IP with 25% area and 20% power overhead. However, functions can be found at higher RE effort. Expansion of literals incurs 36% power overhead. However, it imposes a brute force search increasing the adversarial RE effort by <inline-formula xmlns:mml=http://www.w3.org/1998/Math/MathML xmlns:xlink=http://www.w3.org/1999/xlink> <tex-math notation=LaTeX>$3.04times $ </tex-math></inline-formula> ." @default.
- W3208270918 created "2021-11-08" @default.
- W3208270918 creator A5030090684 @default.
- W3208270918 creator A5048205648 @default.
- W3208270918 creator A5083577016 @default.
- W3208270918 creator A5085567454 @default.
- W3208270918 date "2021-12-01" @default.
- W3208270918 modified "2023-10-17" @default.
- W3208270918 title "SCARE: Side Channel Attack on In-Memory Computing for Reverse Engineering" @default.
- W3208270918 cites W1981943579 @default.
- W3208270918 cites W2004823737 @default.
- W3208270918 cites W2066280488 @default.
- W3208270918 cites W2081729575 @default.
- W3208270918 cites W2086112773 @default.
- W3208270918 cites W2091560655 @default.
- W3208270918 cites W2098240387 @default.
- W3208270918 cites W2112810750 @default.
- W3208270918 cites W2146276996 @default.
- W3208270918 cites W2158963790 @default.
- W3208270918 cites W2396622873 @default.
- W3208270918 cites W2399958287 @default.
- W3208270918 cites W2407339173 @default.
- W3208270918 cites W2508602506 @default.
- W3208270918 cites W2588236721 @default.
- W3208270918 cites W2591601611 @default.
- W3208270918 cites W2593172471 @default.
- W3208270918 cites W2613103714 @default.
- W3208270918 cites W2766489088 @default.
- W3208270918 cites W2770460464 @default.
- W3208270918 cites W2775637085 @default.
- W3208270918 cites W2806210915 @default.
- W3208270918 cites W2810804228 @default.
- W3208270918 cites W2889521801 @default.
- W3208270918 cites W2909364578 @default.
- W3208270918 cites W2971657531 @default.
- W3208270918 cites W4243585432 @default.
- W3208270918 doi "https://doi.org/10.1109/tvlsi.2021.3110744" @default.
- W3208270918 hasPublicationYear "2021" @default.
- W3208270918 type Work @default.
- W3208270918 sameAs 3208270918 @default.
- W3208270918 citedByCount "1" @default.
- W3208270918 countsByYear W32082709182022 @default.
- W3208270918 crossrefType "journal-article" @default.
- W3208270918 hasAuthorship W3208270918A5030090684 @default.
- W3208270918 hasAuthorship W3208270918A5048205648 @default.
- W3208270918 hasAuthorship W3208270918A5083577016 @default.
- W3208270918 hasAuthorship W3208270918A5085567454 @default.
- W3208270918 hasBestOaLocation W32082709182 @default.
- W3208270918 hasConcept C111919701 @default.
- W3208270918 hasConcept C113775141 @default.
- W3208270918 hasConcept C11413529 @default.
- W3208270918 hasConcept C127413603 @default.
- W3208270918 hasConcept C149635348 @default.
- W3208270918 hasConcept C150072547 @default.
- W3208270918 hasConcept C173608175 @default.
- W3208270918 hasConcept C178489894 @default.
- W3208270918 hasConcept C199360897 @default.
- W3208270918 hasConcept C207850805 @default.
- W3208270918 hasConcept C24326235 @default.
- W3208270918 hasConcept C2779960059 @default.
- W3208270918 hasConcept C38652104 @default.
- W3208270918 hasConcept C41008148 @default.
- W3208270918 hasConcept C49289754 @default.
- W3208270918 hasConcept C8643368 @default.
- W3208270918 hasConcept C99138194 @default.
- W3208270918 hasConceptScore W3208270918C111919701 @default.
- W3208270918 hasConceptScore W3208270918C113775141 @default.
- W3208270918 hasConceptScore W3208270918C11413529 @default.
- W3208270918 hasConceptScore W3208270918C127413603 @default.
- W3208270918 hasConceptScore W3208270918C149635348 @default.
- W3208270918 hasConceptScore W3208270918C150072547 @default.
- W3208270918 hasConceptScore W3208270918C173608175 @default.
- W3208270918 hasConceptScore W3208270918C178489894 @default.
- W3208270918 hasConceptScore W3208270918C199360897 @default.
- W3208270918 hasConceptScore W3208270918C207850805 @default.
- W3208270918 hasConceptScore W3208270918C24326235 @default.
- W3208270918 hasConceptScore W3208270918C2779960059 @default.
- W3208270918 hasConceptScore W3208270918C38652104 @default.
- W3208270918 hasConceptScore W3208270918C41008148 @default.
- W3208270918 hasConceptScore W3208270918C49289754 @default.
- W3208270918 hasConceptScore W3208270918C8643368 @default.
- W3208270918 hasConceptScore W3208270918C99138194 @default.
- W3208270918 hasFunder F4320306076 @default.
- W3208270918 hasFunder F4320306087 @default.
- W3208270918 hasIssue "12" @default.
- W3208270918 hasLocation W32082709181 @default.
- W3208270918 hasLocation W32082709182 @default.
- W3208270918 hasOpenAccess W3208270918 @default.
- W3208270918 hasPrimaryLocation W32082709181 @default.
- W3208270918 hasRelatedWork W1515200869 @default.
- W3208270918 hasRelatedWork W1988614714 @default.
- W3208270918 hasRelatedWork W2012327282 @default.
- W3208270918 hasRelatedWork W2042360659 @default.
- W3208270918 hasRelatedWork W2794880365 @default.
- W3208270918 hasRelatedWork W2921578610 @default.
- W3208270918 hasRelatedWork W2990015322 @default.
- W3208270918 hasRelatedWork W3035813418 @default.
- W3208270918 hasRelatedWork W4297803294 @default.