Utilizing I-V non-linearity and analog state variations in ReRAM-based security primitives

The underlying variability in the ReRAM device operation, while undesired in many applications, can be advantageous for hardware security primitives. ReRAM devices also come with the advantage of having non-linear multi-state operation. By comparison with previous reported ReRAM PUFs, which utilized...

Full description

Saved in:
Bibliographic Details
Published in:2017 47th European Solid-State Device Research Conference (ESSDERC) pp. 74 - 77
Main Authors: Adam, G. C., Nili, H., Kim, J., Hoskins, B. D., Kavehei, O., Strukov, D. B.
Format: Conference Proceeding
Language:English
Published: IEEE 01-09-2017
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The underlying variability in the ReRAM device operation, while undesired in many applications, can be advantageous for hardware security primitives. ReRAM devices also come with the advantage of having non-linear multi-state operation. By comparison with previous reported ReRAM PUFs, which utilized spatial variations in the devices' binary ON/OFF states, we proposed to use sneak path currents and device / network nonlinearity as its main source of randomness to implement robust, reconfigurable and dense security primitives. In particular, in this work we present an in-depth discussion of how device non-linearity is affected by the read bias and the thermal stresses applied to the ReRAM crossbar. For the experimental demonstration, we used a three-dimensional stack of two 10×10 Al 2 O 3 /TiO 2-x -based ReRAM crossbars with good uniformity for the memristors in both crossbar layers. The results highlight the utility of device non-linearity to extract more complex and more reliable one-way functions from relatively small ReRAM crossbar arrays.
ISSN:2378-6558
DOI:10.1109/ESSDERC.2017.8066595