N. Du, M. Kiani, Xianyue Zhao, D. Bürger, O. Schmidt, R. Ecke, S. Schulz, H. Schmidt, I. Polian
{"title":"用于硬件安全原语的免电铸记忆电阻器","authors":"N. Du, M. Kiani, Xianyue Zhao, D. Bürger, O. Schmidt, R. Ecke, S. Schulz, H. Schmidt, I. Polian","doi":"10.1109/IVSW.2019.8854394","DOIUrl":null,"url":null,"abstract":"Emerging memristive devices have been recently suggested for use in secret key generation and other hardware security applications. This position paper brings together the views of researchers from material science and hardware-oriented security. It discusses the question which types of memristors are better suitable for the construction of major hardware security primitives. Specifically, this paper points out the problems caused by electroforming, a necessary step for most of today's memristive devices, and advocates the usage of electroforming-free memristors. It discusses which security properties can be met by such devices and where more research is required.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Electroforming-free Memristors for Hardware Security Primitives\",\"authors\":\"N. Du, M. Kiani, Xianyue Zhao, D. Bürger, O. Schmidt, R. Ecke, S. Schulz, H. Schmidt, I. Polian\",\"doi\":\"10.1109/IVSW.2019.8854394\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Emerging memristive devices have been recently suggested for use in secret key generation and other hardware security applications. This position paper brings together the views of researchers from material science and hardware-oriented security. It discusses the question which types of memristors are better suitable for the construction of major hardware security primitives. Specifically, this paper points out the problems caused by electroforming, a necessary step for most of today's memristive devices, and advocates the usage of electroforming-free memristors. It discusses which security properties can be met by such devices and where more research is required.\",\"PeriodicalId\":213848,\"journal\":{\"name\":\"2019 IEEE 4th International Verification and Security Workshop (IVSW)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 4th International Verification and Security Workshop (IVSW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IVSW.2019.8854394\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IVSW.2019.8854394","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Electroforming-free Memristors for Hardware Security Primitives
Emerging memristive devices have been recently suggested for use in secret key generation and other hardware security applications. This position paper brings together the views of researchers from material science and hardware-oriented security. It discusses the question which types of memristors are better suitable for the construction of major hardware security primitives. Specifically, this paper points out the problems caused by electroforming, a necessary step for most of today's memristive devices, and advocates the usage of electroforming-free memristors. It discusses which security properties can be met by such devices and where more research is required.