Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
102 tokens/sec
GPT-4o
59 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
50 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Hardware Security in Spin-Based Computing-In-Memory: Analysis, Exploits, and Mitigation Techniques (2006.01425v1)

Published 2 Jun 2020 in cs.ET and cs.AR

Abstract: Computing-in-memory (CIM) is proposed to alleviate the processor-memory data transfer bottleneck in traditional Von-Neumann architectures, and spintronics-based magnetic memory has demonstrated many facilitation in implementing CIM paradigm. Since hardware security has become one of the major concerns in circuit designs, this paper, for the first time, investigates spin-based computing-in-memory (SpinCIM) from a security perspective. We focus on two fundamental questions: 1) how the new SpinCIM computing paradigm can be exploited to enhance hardware security? 2) what security concerns has this new SpinCIM computing paradigm incurred?

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (6)
  1. Xueyan Wang (16 papers)
  2. Jianlei Yang (32 papers)
  3. Yinglin Zhao (4 papers)
  4. Xiaotao Jia (11 papers)
  5. Gang Qu (40 papers)
  6. Weisheng Zhao (143 papers)
Citations (6)

Summary

We haven't generated a summary for this paper yet.