Understanding and Characterizing Side Channels Exploiting Phase-Change Memories

IEEE MICRO(2023)

引用 0|浏览3
暂无评分
摘要
Recent advances in nonvolatile memory (NVM), together with their performance-optimized architectural schemes, position NVMs as promising building blocks for future main memory. However, the security of such techniques has not been explored. This article performs the first study on information leakage threats in phase-change memories (PCM). We propose an attack framework, read-saw (R-SAW), that systematically investigates side channel vulnerabilities in representative read techniques under interline and intraline interleaving for multilevel cells. Our evaluation shows that the new side channels can accurately leak program secrets (e.g., crypto keys) and are extremely robust to noise. Our work highlights the need to understand microarchitecture security for emerging memory devices.
更多
查看译文
关键词
Phase change materials,Timing,Security,Resistance,Encryption,Microarchitecture,Hardware,Nonvolatile memory,Side-channel attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要