Power Side-Channel Attacks and Countermeasures on Computation-in-Memory Architectures and Technologies.

ETS(2023)

引用 0|浏览18
暂无评分
摘要
To overcome the bottleneck of the classical processorcentric architectures, Computation-in-Memory (CiM) is a promising paradigm where operations are performed directly in memory. Recent works propose the use of CiM to accelerate neural networks or hyperdimensional computing, but also for memory encryption solutions. As CiM facilitates the computation in the analog domain and the output is driven through current sensing, CiM could potentially be highly vulnerable to power side-channel attacks. In this work, we analyze the vulnerability for power side-channel attacks in various CiM implementations based on Static Random Access Memory (SRAM) and emerging non-volatile memristive technologies. Our results show that a side-channel attacker can recover secret data used in an XOR operation with only a few hundred measurements, where CiM architectures based on emerging memristive technologies are more vulnerable than SRAM-based CiM. Therefore, we propose two different types of countermeasures based on hiding and masking, which are tailored to CiM architectures. The efficiency of our proposed countermeasures is shown by both attacks and leakage assessment methodologies using one million measurement traces.
更多
查看译文
关键词
CiM architectures,computation-in-memory architectures,hiding countermeasure,hyperdimensional computing,leakage assessment methodologies,masking countermeasure,memory encryption solutions,nonvolatile memristive technologies,power side-channel attacks,secret data recovery,SRAM-based CiM,static random access memory,XOR operation
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要