Ultra-fast data sanitization of SRAM by back-biasing to resist a cold boot attack

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Although SRAM is a well-established type of volatile memory, data remanence has been observed at low temperature even for a power-off state, and thus it is vulnerable to a physical cold boot attack. To address this, an ultra-fast data sanitization method within 5 ns is demonstrated with physics-based simulations for avoidance of the cold boot attack to SRAM. Back-bias, which can control device parameters of CMOS, such as threshold voltage and leakage current, was utilized for the ultra-fast data sanitization. It is applicable to temporary erasing with data recoverability against a low-level attack as well as permanent erasing with data irrecoverability against a high-level attack.

Cite

CITATION STYLE

APA

Han, S. J., Han, J. K., Yun, G. J., Lee, M. W., Yu, J. M., & Choi, Y. K. (2022). Ultra-fast data sanitization of SRAM by back-biasing to resist a cold boot attack. Scientific Reports, 12(1). https://doi.org/10.1038/s41598-021-03994-2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free