Akshay Wali, Harikrishnan Ravichandran and Saptarshi Das
{"title":"基于二维mem晶体管的硬件木马","authors":"Akshay Wali, Harikrishnan Ravichandran and Saptarshi Das","doi":"10.1039/D2NH00568A","DOIUrl":null,"url":null,"abstract":"<p >Hardware Trojans (HTs) have emerged as a major security threat for integrated circuits (ICs) owing to the involvement of untrustworthy actors in the globally distributed semiconductor supply chain. HTs are intentional malicious modifications, which remain undetectable through simple electrical measurements but can cause catastrophic failure in the functioning of ICs in mission critical applications. In this article, we show how two-dimensional (2D) material based in-memory computing elements such as memtransistors can be used as hardware Trojans. We found that logic gates based on 2D memtransistors can be made to malfunction by exploiting their inherent programming capabilities. While we use 2D memtransistor-based ICs as the testbed for our demonstration, the results are equally applicable to any state-of-the-art and emerging in-memory computing technologies.</p>","PeriodicalId":93,"journal":{"name":"Nanoscale Horizons","volume":" 5","pages":" 603-615"},"PeriodicalIF":8.0000,"publicationDate":"2023-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hardware Trojans based on two-dimensional memtransistors†\",\"authors\":\"Akshay Wali, Harikrishnan Ravichandran and Saptarshi Das\",\"doi\":\"10.1039/D2NH00568A\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p >Hardware Trojans (HTs) have emerged as a major security threat for integrated circuits (ICs) owing to the involvement of untrustworthy actors in the globally distributed semiconductor supply chain. HTs are intentional malicious modifications, which remain undetectable through simple electrical measurements but can cause catastrophic failure in the functioning of ICs in mission critical applications. In this article, we show how two-dimensional (2D) material based in-memory computing elements such as memtransistors can be used as hardware Trojans. We found that logic gates based on 2D memtransistors can be made to malfunction by exploiting their inherent programming capabilities. While we use 2D memtransistor-based ICs as the testbed for our demonstration, the results are equally applicable to any state-of-the-art and emerging in-memory computing technologies.</p>\",\"PeriodicalId\":93,\"journal\":{\"name\":\"Nanoscale Horizons\",\"volume\":\" 5\",\"pages\":\" 603-615\"},\"PeriodicalIF\":8.0000,\"publicationDate\":\"2023-01-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Nanoscale Horizons\",\"FirstCategoryId\":\"88\",\"ListUrlMain\":\"https://pubs.rsc.org/en/content/articlelanding/2023/nh/d2nh00568a\",\"RegionNum\":2,\"RegionCategory\":\"材料科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"CHEMISTRY, PHYSICAL\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Nanoscale Horizons","FirstCategoryId":"88","ListUrlMain":"https://pubs.rsc.org/en/content/articlelanding/2023/nh/d2nh00568a","RegionNum":2,"RegionCategory":"材料科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"CHEMISTRY, PHYSICAL","Score":null,"Total":0}
Hardware Trojans based on two-dimensional memtransistors†
Hardware Trojans (HTs) have emerged as a major security threat for integrated circuits (ICs) owing to the involvement of untrustworthy actors in the globally distributed semiconductor supply chain. HTs are intentional malicious modifications, which remain undetectable through simple electrical measurements but can cause catastrophic failure in the functioning of ICs in mission critical applications. In this article, we show how two-dimensional (2D) material based in-memory computing elements such as memtransistors can be used as hardware Trojans. We found that logic gates based on 2D memtransistors can be made to malfunction by exploiting their inherent programming capabilities. While we use 2D memtransistor-based ICs as the testbed for our demonstration, the results are equally applicable to any state-of-the-art and emerging in-memory computing technologies.
期刊介绍:
Nanoscale Horizons stands out as a premier journal for publishing exceptionally high-quality and innovative nanoscience and nanotechnology. The emphasis lies on original research that introduces a new concept or a novel perspective (a conceptual advance), prioritizing this over reporting technological improvements. Nevertheless, outstanding articles showcasing truly groundbreaking developments, including record-breaking performance, may also find a place in the journal. Published work must be of substantial general interest to our broad and diverse readership across the nanoscience and nanotechnology community.