Cargando…

Ultra-fast data sanitization of SRAM by back-biasing to resist a cold boot attack

Although SRAM is a well-established type of volatile memory, data remanence has been observed at low temperature even for a power-off state, and thus it is vulnerable to a physical cold boot attack. To address this, an ultra-fast data sanitization method within 5 ns is demonstrated with physics-base...

Descripción completa

Detalles Bibliográficos
Autores principales: Han, Seong-Joo, Han, Joon-Kyu, Yun, Gyeong-Jun, Lee, Mun-Woo, Yu, Ji-Man, Choi, Yang-Kyu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8742074/
https://www.ncbi.nlm.nih.gov/pubmed/34997028
http://dx.doi.org/10.1038/s41598-021-03994-2
_version_ 1784629635334537216
author Han, Seong-Joo
Han, Joon-Kyu
Yun, Gyeong-Jun
Lee, Mun-Woo
Yu, Ji-Man
Choi, Yang-Kyu
author_facet Han, Seong-Joo
Han, Joon-Kyu
Yun, Gyeong-Jun
Lee, Mun-Woo
Yu, Ji-Man
Choi, Yang-Kyu
author_sort Han, Seong-Joo
collection PubMed
description Although SRAM is a well-established type of volatile memory, data remanence has been observed at low temperature even for a power-off state, and thus it is vulnerable to a physical cold boot attack. To address this, an ultra-fast data sanitization method within 5 ns is demonstrated with physics-based simulations for avoidance of the cold boot attack to SRAM. Back-bias, which can control device parameters of CMOS, such as threshold voltage and leakage current, was utilized for the ultra-fast data sanitization. It is applicable to temporary erasing with data recoverability against a low-level attack as well as permanent erasing with data irrecoverability against a high-level attack.
format Online
Article
Text
id pubmed-8742074
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-87420742022-01-11 Ultra-fast data sanitization of SRAM by back-biasing to resist a cold boot attack Han, Seong-Joo Han, Joon-Kyu Yun, Gyeong-Jun Lee, Mun-Woo Yu, Ji-Man Choi, Yang-Kyu Sci Rep Article Although SRAM is a well-established type of volatile memory, data remanence has been observed at low temperature even for a power-off state, and thus it is vulnerable to a physical cold boot attack. To address this, an ultra-fast data sanitization method within 5 ns is demonstrated with physics-based simulations for avoidance of the cold boot attack to SRAM. Back-bias, which can control device parameters of CMOS, such as threshold voltage and leakage current, was utilized for the ultra-fast data sanitization. It is applicable to temporary erasing with data recoverability against a low-level attack as well as permanent erasing with data irrecoverability against a high-level attack. Nature Publishing Group UK 2022-01-07 /pmc/articles/PMC8742074/ /pubmed/34997028 http://dx.doi.org/10.1038/s41598-021-03994-2 Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Han, Seong-Joo
Han, Joon-Kyu
Yun, Gyeong-Jun
Lee, Mun-Woo
Yu, Ji-Man
Choi, Yang-Kyu
Ultra-fast data sanitization of SRAM by back-biasing to resist a cold boot attack
title Ultra-fast data sanitization of SRAM by back-biasing to resist a cold boot attack
title_full Ultra-fast data sanitization of SRAM by back-biasing to resist a cold boot attack
title_fullStr Ultra-fast data sanitization of SRAM by back-biasing to resist a cold boot attack
title_full_unstemmed Ultra-fast data sanitization of SRAM by back-biasing to resist a cold boot attack
title_short Ultra-fast data sanitization of SRAM by back-biasing to resist a cold boot attack
title_sort ultra-fast data sanitization of sram by back-biasing to resist a cold boot attack
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8742074/
https://www.ncbi.nlm.nih.gov/pubmed/34997028
http://dx.doi.org/10.1038/s41598-021-03994-2
work_keys_str_mv AT hanseongjoo ultrafastdatasanitizationofsrambybackbiasingtoresistacoldbootattack
AT hanjoonkyu ultrafastdatasanitizationofsrambybackbiasingtoresistacoldbootattack
AT yungyeongjun ultrafastdatasanitizationofsrambybackbiasingtoresistacoldbootattack
AT leemunwoo ultrafastdatasanitizationofsrambybackbiasingtoresistacoldbootattack
AT yujiman ultrafastdatasanitizationofsrambybackbiasingtoresistacoldbootattack
AT choiyangkyu ultrafastdatasanitizationofsrambybackbiasingtoresistacoldbootattack