MT
Authored
7 records found
Survey on Architectural Attacks
A Unified Classification and Attack Model
According to the World Economic Forum, cyberattacks are considered as one of the most important sources of risk to companies and institutions worldwide. Attacks can target the network, software, and/or hardware. Over the years, much knowledge has been developed to understand and
...
APmap
An Open-Source Compiler for Automata Processors
A novel type of hardware accelerators called automata processors (APs) have been proposed to accelerate finite-state automata. The bone structure of an AP is a hierarchical routing matrix that connects many memory arrays. With this structure, an AP can process an input symbol eve
...
MFA-MTJ Model
Magnetic-Field-Aware Compact Model of pMTJ for Robust STT-MRAM Design
The popularity of perpendicular magnetic tunnel junction (pMTJ)-based spin-transfer torque magnetic random access memories (STT-MRAMs) is growing very fast. The performance of such memories is very sensitive to magnetic fields, including both internal and external ones. This arti
...
Dependability of Future Edge-AI Processors
Pandora’s Box
This paper addresses one of the directions of the HORIZON EU CONVOLVE project being dependability of smart edge processors based on computation-in-memory and emerging memristor devices such as RRAM. It discusses how how this alternative computing paradigm will change the way we u
...
Guard-NoC
A protection against side-channel attacks for MPSoCs
Multi-Processor System-on-Chips (MPSoCs) are popular computational platforms for a wide variety of applications due to their energy efficiency and flexibility. Like many other platforms they are vulnerable to Side Channel Attacks (SCAs). In particular, Logical SCAs (LSCAs) are ve
...
Synthesizing HDL to Memristor Technology
A Generic Framework
Memristors are emerging devices with huge potentials. It has been shown that they can be used not only to design non-volatile memories, but also logic circuits. In the latter, memristor devices are stacked on a CMOS circuit which
generates the required control signals needed by t
...
Synthesizing HDL to Memristor Technology
A Generic Framework
Memristors are emerging devices with huge potentials. It has been shown that they can be used not only to design non-volatile memories, but also logic circuits. In the latter, memristor devices are stacked on a CMOS circuit which
generates the required control signals needed by t
...
Contributed
13 records found
Circumventing Secure JTAG
A detailed plan of attack
Forensic science is the cornerstone of the modern justice system, as it allows us to analyze evidence in order to discover the truth behind a crime scene. As mobile phones became more important to our daily lives they've taken up a bigger part in forensic research as well. These
...
FPGA-based soft error correction for the memory of microcontrollers
A generic methodology to transparent soft error correction for the off-chip memory of microcontrollers operating in space
Manufacturers of CubeSats prefer the use of COTS electronic components such as microcontrollers (MCU) and SDRAM but these components are vulnerable to errors caused by radiation. A specific type of error caused by radiation are soft errors which can be corrected by Error Detectio
...
Embedded Memory Security
Preventing hardware based attacks on the memory of IoT devices
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightweight devices with an internet connection have been integrated into many aspects of daily life; from consumer products to industrial processes and from medical applications to criti
...
Hardware-Based Methods for Memory Acquisition
Analysis and Improvements
Some
server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”)
or unintentionally (“bad hosters”). When dealing with uncooperative hosters
during forensic investigations, it may sometimes be necessary to collect data or
information on the server
...
Detecting Unique RRAM Faults
High Fault Coverage Design-For-Testability Scheme
Resistive Random-Access Memory (RRAM) is an emerging memory technology that has the possibility to compete with mainstream memory technologies such as Dynamic Random-Access Memory (DRAM) and flash memory. The reason why RRAM has not seen mass adoption yet is due to its defect-pro
...
In-Depth Analysis of DRAM Cells During Rowhammer
And a Novel Protection Method
Rowhammer is a security exploit used to cause bit errors DRAM chips. Newer DRAM technologies are becoming more vulnerable to rowhammer attacks, and existing protec- tion methods are starting to reach their limits. This thesis provides methods for DRAM characterization by means of
...
Formjackers
Towards an Internet-scale Survey of Credit Card Skimming on the Web
We propose a novel, dynamic analysis-based detection solution for formjackers. The operating principle of these formjackers, or card skimmers on the web, is typically simple, yet effective: when making a payment on webshop that has been infected with a formjacker, the submitted p
...
Modeling the physics of RRAM defects
A model simulating RRAM defects on a macroscopic physical level
Resistive RAM, or RRAM, is one of the emerging non-volatile memory (NVM) technologies, which could be used in the near future to fill the gap in the memory hierarchy between dynamic RAM (DRAM) and Flash, or even completely replace Flash. RRAM operates faster than Flash, but is st
...
DRAM Reliability
Aging Analysis and Reliability Prediction Model
An increasing amount of critical applications use DRAM as main memory in its computing systems. It it therefore extremely important that these memories function correctly during their lifetime in order to prevent catastrophic failures. Already during the design phase, the reliabi
...
Diagnosis Methodology for STT-MRAM
Defect Identification and Classification
This thesis focuses on identifying and classifying defects in STT-MRAM technology using novel and machine learning approaches. The thesis discusses the basic principles of STT-MRAM and the semiconductor chip manufacturing process and test stages. The research aims to develop nove
...
Design and Verification of LUPIn
A Platform for Hardware Attacks on Encrypted USB Drives
Forensics is the art of gathering evidence, which for electronics amounts to accurately recovering data. Often, this can only be archived with state-of-the-art hacking techniques.
However, replicating state-of-the-art research in hardware security can be difficult, due to the lar
...
Testing RRAM and Computation-in-Memory Devices
Defects, Fault Models, and Test Solutions
Resistive random access memory (RRAM) is a promising emerging memory technology that offers dense, non-volatile memories that do not consume any static power. Furthermore, RRAMdevices can be written and read out in nanoseconds, and it is possible to use them to performcomputation
...
Computation-in-Memory
From Circuits to Compilers
Memristive devices are promising candidates as a complement to CMOS devices. These devices come with several advantages such as non-volatility, high density, good scalability, and CMOS compatibility. They enable in-memory computing paradigms since they can be used for both storin
...