Table Of ContentSecurity Opportunities in
Nano Devices and Emerging
Technologies
Security Opportunities in
Nano Devices and Emerging
Technologies
Edited and Contributed by
Mark Tehranipoor
Domenic Forte
Garrett S. Rose
Swarup Bhunia
CRCPress
Taylor&FrancisGroup
6000BrokenSoundParkwayNW,Suite300
BocaRaton,FL33487-2742
(cid:2)c 2018byTaylor&FrancisGroup,LLC
CRCPressisanimprintofTaylor&FrancisGroup,anInformabusiness
NoclaimtooriginalU.S.Governmentworks
Printedonacid-freepaper
InternationalStandardBookNumber-13:978-1-138-03577-5(Hardback)
978-1-315-26505-6(eBook)
Thisbookcontainsinformationobtainedfromauthenticandhighlyregardedsources.Reasonableeffortshavebeen
madetopublishreliabledataandinformation,buttheauthorandpublishercannotassumeresponsibilityforthevalidity
ofallmaterialsortheconsequencesoftheiruse.Theauthorsandpublishershaveattemptedtotracethecopyright
holdersofallmaterialreproducedinthispublicationandapologizetocopyrightholdersifpermissiontopublishinthis
formhasnotbeenobtained.Ifanycopyrightmaterialhasnotbeenacknowledgedpleasewriteandletusknowsowe
mayrectifyinanyfuturereprint.
ExceptaspermittedunderU.S.CopyrightLaw,nopartofthisbookmaybereprinted,reproduced,transmitted,or
utilizedinanyformbyanyelectronic,mechanical,orothermeans,nowknownorhereafterinvented,includingpho-
tocopying,microfilming,andrecording,orinanyinformationstorageorretrievalsystem,withoutwrittenpermission
fromthepublishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com
(http://www.copyright.com/)orcontacttheCopyrightClearanceCenter,Inc.(CCC),222RosewoodDrive,Danvers,
MA01923,978-750-8400.CCCisanot-for-profitorganizationthatprovideslicensesandregistrationforavarietyof
users.FororganizationsthathavebeengrantedaphotocopylicensebytheCCC,aseparatesystemofpaymenthasbeen
arranged.
Trademark Notice:Productorcorporatenamesmaybetrademarksorregisteredtrademarks,andareusedonlyfor
identificationandexplanationwithoutintenttoinfringe.
VisittheTaylor&FrancisWebsiteat
http://www.taylorandfrancis.com
andtheCRCPressWebsiteat
http://www.crcpress.com
Tomyfamily.
MarkTehranipoor
Tomyfamily.
DomenicForte
TomywifeBetsyanddaughterLillyfortheirconstantsupportandencouragement.
GarrettS.Rose
Tomystudents.
SwarupBhunia
Contents
Preface...............................................................................................................ix
Acknowledgments..............................................................................................xiii
Editors..............................................................................................................xv
Contributors.....................................................................................................xix
SECTION I NANO AND EMERGING DEVICES
1 Introduction:OverviewofVLSI,Nanoelectronics,andHardwareSecurity.............. 3
GARRETTS.ROSE
2 NanoCMOSLogic-BasedSecurityPrimitiveDesign.........................................19
FAHIMRAHMAN,ATULPRASADDEBNATH,DOMENICFORTE,SWARUPBHUNIA,
ANDMARKTEHRANIPOOR
3 NanoscaleCMOSMemory-BasedSecurityPrimitiveDesign...............................39
DANIELE.HOLCOMB
4 Memristor-BasedSecurity...........................................................................55
MdTANVIRARAFINANDGANGQU
5 RRAM-BasedHardwareSecurityPrimitives....................................................73
SHIMENGYU,XIAOYUSUN,RUILIU,HUAQIANGWU,YACHUANPANG,BINGAO,
HEQIAN,ANDANCHEN
6 PhaseChangeMemoryandItsApplicationsinHardwareSecurity .......................93
RAIHANSAYEEDKHAN,NAFISANOOR,CHENGLUJIN,JAKESCOGGIN,
ZACHARYWOODS,SADIDMUNEER,AARONCIARDULLO,PHUONGHANGUYEN,
ALIGOKIRMAK,MARTENVANDIJK,ANDHELENASILVA
7 Spin-Transfer-TorqueRAMandDomainWallMemoryDevices ........................115
REKHAGOVINDARAJ,MOHAMMADNASIMIMTIAZKHAN,
ANDSWAROOPGHOSH
8 Polarity-ControllableSiliconNanoWireFET-BasedSecurity.............................143
YUBI,PIERRE-EMMANUELGAILLARDON,X.SHARONHU,MICHAELNIEMIER,
JIANN-SHIUNYUAN,ANDYIERJIN
9 Carbon-BasedNovelDevicesforHardwareSecurity........................................157
HAOTINGSHEN,FAHIMRAHMAN,MARKTEHRANIPOOR,AND
DOMENICFORTE
vii
viii (cid:2) Contents
SECTIONII EMERGING TECHNOLOGIES AND ARCHITECTURES
10 CompositionofPhysicalUnclonableFunctions:FromDevicetoArchitecture.......177
FAHIMRAHMAN,ATULPRASADDEBNATH,SWARUPBHUNIA,DOMENICFORTE,
ANDMARKTEHRANIPOOR
11 SecurityinEmergingFabricationTechnologies..............................................197
YUNTAOLIU,YANGXIE,ANDANKURSRIVASTAVA
12 NanoscaleMemoryArchitecturesforNeuromorphicComputing.......................215
CHAOFEIYANG,HAILI,ANDYIRANCHEN
13 LeveragingCircuitEditforLow-VolumeTrustedNanometerFabrication.............235
BICKYSHAKYA,XIAOLINXU,NAVIDASADIZANJANI,MARKTEHRANIPOOR,
ANDDOMENICFORTE
14 BISTforOnlineEvaluationofPUFsandTRNGs...........................................257
SIAMU.HUSSAIN,MEHRDADMAJZOOBI,ANDFARINAZKOUSHANFAR
15 DigitalMicrofluidicBiochipSecurity..........................................................287
JACKTANG,MOHAMEDIBRAHIM,KRISHNENDUCHAKRABARTY,
ANDRAMESHKARRI
16 NanoelectromechanicalSystemsSecureFPGAandSecurityPrimitives ................307
PHILIPX.-L.FENGANDSWARUPBHUNIA
17 AChaoticLogic-BasedPhysicalUnclonableComputingSystem........................327
CORYMERKEL,MESBAHUDDIN,ANDGARRETTS.ROSE
18 SecurityfromSneakPathsinCrossbarMemoryArchitectures...........................343
Md.BADRUDDOJAMAJUMDER,MESBAHUDDIN,ANDGARRETTS.ROSE
Index..........................................................................................................361
Preface
Over the past three decades, the semiconductor industry and research community have devoted
considerable effort toward developing new nano devices, analyzing their fundamental properties,
and evaluating their viability for life after CMOS. Phase change memories (PCMs), memristors,
nanowires,carbonnanotubes(CNTs),andgraphenearejustafewexamplesofsuchtechnologies.
Asthesearchforasuccessorcontinues,CMOShasremainedaviabletechnologydespitenanoscale
integrationchallengesthroughtheemergenceofFinFET,fullydepletedsilicononinsulator(FD-
SOI), and other technologies contributing to its staying power. In all these developments, the
emphasishasalwaysbeenplacedonconventionalmetricssuchasscalability(tosmallertechnology
nodes),performance,power,reliability,andendurance.Littleifanyattentionhasbeengiventothe
properties, opportunities, and challenges that nano devices may offer to the security community,
manufacturers,systemintegrators,andendusers.
Research in CMOS technology-based hardware security at higher levels of abstraction (e.g.,
circuitandarchitecture)hasseenconsistentgrowthoverthepastdecade,butthepastseveralyears
haveseenanuptickinresearchonthesecurityofnanodevices.
Todate,anydiscoveryidentifyingcertaindevicesorfeaturesinsomedevicestobesuitablefor
improvingsecurityhasbeenbasedonanunderstandingoftheindividualprimitivesorproperties
of those devices. The research community currently lacks both the capability to fully explain the
effectivenessofexistingtechniquesandthemetricstopredictthesecuritypropertiesandvulnera-
bilitiesofthenextgenerationofnanodevicesandsystems.Nostandardsexistingovernmentand
industry to theoretically or experimentally evaluate any new devices against a set of known met-
rics and examine their strengths and weaknesses against known attacks. Further, since security is
notconsideredaprimaryobjectiveduringdevicedevelopmentandmodeling,today,mostsecurity
techniques are developed after devices have reached a certain level of maturity. Thus, obtaining a
highlevelofsecurityinthatstagecanbeextremelychallengingandexpensive.
The objective of this book is to address these gaps in the fundamental knowledge base by
bringing active researchers in hardware security and nanoelectronics areas together to provide an
in-depth analysis of various security issues and to explain how nano devices and their unique
propertiescanaddressthem.Thisbookincludescontributionsfromexpertsinlogicandmemory
devices like resistive memory elements, PCM, and silicon nanowire devices, as well as emerging
architectures and systems like 2.5/3D architectures and memory architectures for neuromorphic
computing.Thisbookiscomposedoftwomajorsectionsandabriefoutlineisprovidedbelow:
1. Section I focuses on nano devices and building security primitives from them. The target
devicesincludenanoCMOS,CNTs,nanowires,PCMs,resistiveRAM,andmemristors.
(cid:2) Chapter1providesabriefbackgroundonconventionalCMOSandexamplesofemerg-
ingnanoscaleCMOStransistorsasourfirstforayintothenanoregime.Thecornucopia
ix