2011
DOI: 10.1109/mm.2010.101
|View full text |Cite
|
Sign up to set email alerts
|

Security Refresh: Protecting Phase-Change Memory against Malicious Wear Out

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 7 publications
0
15
0
Order By: Relevance
“…The start-gap algorithm is extended in [16] to an online attack detector, which dynamically adjusts the frequency of start-gap by monitoring suspicious memory write patterns. Furthermore, both [3] and [17] propose schemes to randomly swap the memory addresses of data blocks, to protect memory against malicious wear out attacks.…”
Section: Pcm Security Enhancementsmentioning
confidence: 99%
“…The start-gap algorithm is extended in [16] to an online attack detector, which dynamically adjusts the frequency of start-gap by monitoring suspicious memory write patterns. Furthermore, both [3] and [17] propose schemes to randomly swap the memory addresses of data blocks, to protect memory against malicious wear out attacks.…”
Section: Pcm Security Enhancementsmentioning
confidence: 99%
“…A preSET method was proposed to enhance the performance of PCM by scheduling the SET operation before the actual write operation [10]. The security issue in PCM has been studied in [11], [12]. The security refresh approach was proposed to protect PCM against malicious wear out [11].…”
Section: Related Workmentioning
confidence: 99%
“…The security issue in PCM has been studied in [11], [12]. The security refresh approach was proposed to protect PCM against malicious wear out [11]. A low overhead method via online attack detection was designed [12].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, NVMs present new challenges in comparison to DRAM: asymmetric read/write access latencies, higher power/energy requirements, and limited endurance, which impede their large-scale adoption in computing systems [1][2][3]. To overcome these problems, a broad set of solutions that rely on dataencoding [5], write scheduling [6][7][8][9], data-migration using address translation [10][11][12], and architectural improvements [13,14] have been proposed. However, these techniques address either NVM latency, power/energy, or endurance explicitly; this potentially limits their effectiveness in practice.…”
Section: Introductionmentioning
confidence: 99%