Side channel attacks on STTRAM and low-overhead countermeasures

2016 
Spin-Torque Transfer RAM (STTRAM) is a promising candidate for last level cache due to its high density, high endurance and low leakage. Although promising, STTRAM suffers from high write latency and write current. Additionally, the latency and current depends on the polarity of the data being written. These factors introduce security vulnerabilities and expose the cache memory to side channel attacks (SCA). In this paper we propose a SCA model where the adversary can monitor the supply current of the memory array to partially identify the sensitive cache data that is being read or written. We propose a suite of low-cost solutions such as short retention STTRAM, obfuscation of side channel using 1-bit parity and multi-bit random write, and, neutralizing the side channel using constant current write driver to mitigate the attack. Our analysis reveal that the 1-bit parity reduces the number of distinct write current states by 30% for 32-bit word and the current signature is further obfuscated by multi-bit random writes. Constant current write makes it more challenging for the attacker to extract the entire word using a single supply current signature.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    14
    References
    12
    Citations
    NaN
    KQI
    []