2023
DOI: 10.1002/adma.202205365
|View full text |Cite
|
Sign up to set email alerts
|

Hardware and Information Security Primitives Based on 2D Materials and Devices

Abstract: Hardware security is a major concern for the entire semiconductor ecosystem that accounts for billions of dollars in annual losses. Similarly, information security is a critical need for the rapidly proliferating edge devices that continuously collect and communicate a massive volume of data. While silicon‐based complementary metal‐oxide‐semiconductor technology offers security solutions, these are largely inadequate, inefficient, and often inconclusive, as well as resource intensive in time, energy, and cost,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
16
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

3
6

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 210 publications
0
16
0
Order By: Relevance
“…Therefore, augmenting hardware security primitives has the potential to accelerate their adoption process and make them more attractive for IoT implementation. 31 In this context, some of the recently demonstrated hardware security applications 20,32−34 with MoS 2 as the channel material are encouraging. Before the operational assessment of our MoS 2 TSI-based TRNG, we first evaluated the quality of the grown MoS 2 film.…”
Section: Fabrication and Characterization Of 2d Fets Basedmentioning
confidence: 92%
“…Therefore, augmenting hardware security primitives has the potential to accelerate their adoption process and make them more attractive for IoT implementation. 31 In this context, some of the recently demonstrated hardware security applications 20,32−34 with MoS 2 as the channel material are encouraging. Before the operational assessment of our MoS 2 TSI-based TRNG, we first evaluated the quality of the grown MoS 2 film.…”
Section: Fabrication and Characterization Of 2d Fets Basedmentioning
confidence: 92%
“…For example, bioinspired devices have been demonstrated using in a split-gated MoS 2 device with hydrogen silsesquioxane gate dielectric that can mimic the auditory cortex of a barn owl or be used for energy efficient and biorealistic spiking neural networks. , ALD grown 50 nm Al 2 O 3 on Pt/TiN/p +2 Si stack with 2D TMDs were used to demonstrate simulated annealing for Ising type spin systems, biomimetic collision detection based on the escape response in locusts, monolithically integrated, multipixel, bioinspired neural networks, bioinspired machine vision, and inspect-inspired collision detectors . Similarly, inherent stochastic charge trapping and detrapping in gate stacks that lead to cycle-to-cycle variation in device characteristics have been exploited for applications in stochastic computing , and hardware security. , Similar architectures based on ALD grown 50 nm Al 2 O 3 /Pt/TiN stack for MoS 2 memtransistor exploited the programmable stochasticity to demonstrate logic gate-based arithmetic operations, energy efficient hardware implementation of a Bayesian network, and probabilistic synapses and reconfigurable neurons for Bayesian neural networks . Hardware security applications can also utilize this architecture, with demonstrations of logic locking, physical unclonable functions, anticounterfeit measures, optical watermarks, camouflaging, and true random number generators …”
Section: Applicationsmentioning
confidence: 99%
“…118 Similarly, inherent stochastic charge trapping and detrapping in gate stacks that lead to cycle-to-cycle variation in device characteristics have been exploited for applications in stochastic computing 119,120 and hardware security. 121,122 Similar architectures based on ALD grown 50 nm Al 2 O 3 /Pt/TiN stack for MoS 2 memtransistor exploited the programmable stochasticity to demonstrate logic gate-based arithmetic operations, 123 energy efficient hardware implementation of a Bayesian network, 124 and probabilistic synapses and reconfigurable neurons for Bayesian neural networks. 125 Hardware security applications can also utilize this architecture, with demonstrations of logic locking, 126 physical unclonable functions, 127 anticounterfeit measures, 127 optical watermarks, 127 camouflaging, 127 and true random number generators.…”
Section: Applicationsmentioning
confidence: 99%
“…Hardware security is a pressing need for Internet of Things (IoT) edge devices, and physically unclonable functions (PUFs) are relatively low-cost, low-power, and low-overhead hardware security solutions. PUFs exploit manufacturing process variation in devices and their interactions with external stimuli to generate unique and unpredictable digital signatures, which can be used for hardware authentication. , While silicon PUFs are the most prevalent in the semiconductor industry, their low entropy resulting from poor device-to-device variation and high power consumption owing to their need for complex error correcting peripheral circuits have led to the investigation of alternative PUF formats, , including nanowire PUFs, memristive PUFs, , graphene PUFs, CNT PUFs, polymer PUFs, and even optical and biological PUFs. , …”
mentioning
confidence: 99%