2017 IEEE International Conference on Computer Design (ICCD) 2017
DOI: 10.1109/iccd.2017.14
|View full text |Cite
|
Sign up to set email alerts
|

Side-Channel Attack on STTRAM Based Cache for Cryptographic Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 27 publications
(17 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…The results show that the secret key can be retrieved from MRAM write operation traces. proved [84].…”
Section: Sca On Sttrammentioning
confidence: 90%
See 4 more Smart Citations
“…The results show that the secret key can be retrieved from MRAM write operation traces. proved [84].…”
Section: Sca On Sttrammentioning
confidence: 90%
“…(i) High write current: This can lead to supply noise. Adversary can generate deterministic supply noise and launch a DoS attack [85], fault injection attack [85], information leakage attack [86], and row hammer attack [87]; (ii) Asymmetric [49] write and read current: This can be leveraged to launch side channel attack [81][82][83][84]; (iii) Susceptibility to external fields: An external magnetic field can lead to magnetic orientation flip of MTJ free layer of MTJ which corrupts the data [80]. Adversary can leverage this to launch attacks (e.g., DoS).…”
Section: Nvm Devices and Their Vulnerabilitiesmentioning
confidence: 99%
See 3 more Smart Citations