Document Type
Dissertation
Degree
Doctor of Philosophy (PhD)
Major/Program
Electrical and Computer Engineering
First Advisor's Name
Md Tauhidur Rahman
First Advisor's Committee Title
Committee chair
Second Advisor's Name
Kemal Akkaya
Second Advisor's Committee Title
Committee member
Third Advisor's Name
Ou Bai
Third Advisor's Committee Title
Committee member
Fourth Advisor's Name
Ananda Mohan Mondal
Fourth Advisor's Committee Title
Committee member
Keywords
Magneto-resistive random access memory, Resistive random access memory, True random number generator, Watermarking, Counterfeiting, Supply-chain Security, Steganography
Date of Defense
11-4-2022
Abstract
Emerging non-volatile memory (NVM) technologies such as Magneto-resistive random access memory (MRAM), Resistive RAM (ReRAM), Ferroelectric RAM (FeRAM), and Phase Change Memory (PCM) have shown great potential for building next-generation computing systems because of their near-zero leakage, unlimited endurance, scalability, fast speed, and high-density characteristics. While the MRAM has the potential to replace static RAM (SRAM) in large-scale and low-power on-chip caches and dynamic RAM (DRAM) in energy-efficient main memory, the ReRAM is a promising candidate for low-power and large-scale main memory and storage systems. Emerging cost-effective, low latency, high performance, and low energy memories can be used as a stand-alone memory chip or integrated at the same process nodes of microcontrollers, system-on-chip, and FPGAs; thus becoming an excellent candidate for applications requiring high security and efficient NVM embedded in semiconductors such as Internet of Things (IoT), wearables, tablets, smartphones, consumer electronics, artificial intelligence, industrial, automotive, and medical. While these memories play essential roles in performance, they can also be used as core components to ensure system and supply-chain security. Higher levels of security can be achieved by implementing security primitives or digital signatures within integrated circuit semiconductor hardware and using them in secure communication, authentication, and other cryptographic operations. On the other hand, these inherent properties of emerging memories can be used to protect cloning and other means of counterfeiting. This thesis will explore the prospect of emerging memory chips to ensure system and supply-chain security issues. First, a new idea of hiding information in commercial off-the-shelf (COTS) ReRAM is presented for secure and covert data storage. Second, this work proposes a low-cost, non-invasive, robust watermarking technique using COTS ReRAM to identify major counterfeiting types, such as remarked, overproduced, and cloned. Third, COTS MRAM-based security primitive, i.e., True random number generator or TRNG, is proposed and demonstrated for low-cost alternatives to generate random keys, cryptographic nonces, session keys, one-time-pad, etc., for the secure operation of electronic devices and systems.
Identifier
FIDC010858
ORCID
https://orcid.org/0000-0001-5510-6193
Previously Published In
[B1] F. Ferdaus and M. T. Rahman, “Security of Emerging Memory Chips,” Cham: Springer International Publishing, 2021.
[C1] F. Ferdaus, B. M. S. Bahar Talukder, and M. T. Rahman, “Watermarked ReRAM: A technique to Prevent Counterfeit Memory Chips,” ACM GLSVLSI, 2022.
[C2] F. Ferdaus, B. M. S. Bahar Talukder, M. Sadi, and M. T. Rahman, “True Random Number Generation using Latency Variations of Commercial MRAM Chips,” IEEE ISQED, 2021.
Recommended Citation
Ferdaus, Farah, "Facilitating Emerging Non-volatile Memories for Ensuring Security and Device Trust" (2022). FIU Electronic Theses and Dissertations. 5220.
https://digitalcommons.fiu.edu/etd/5220
Rights Statement
In Copyright. URI: http://rightsstatements.org/vocab/InC/1.0/
This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).