Issue No. 01 - January/February (2011 vol. 31)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MM.2010.101
Nak Hee Seong , Georgia Institute of Technology
Dong Hyuk Woo , Intel Labs
Hsien-Hsin S. Lee , Georgia Institute of Technology
<p>As dynamic RAM scaling approaches its physical limit, phase-change memory is the most mature and well-studied option for potential DRAM replacement. However, malicious wear-out attacks can exploit PCM's limited write endurance. To address this, a low-cost wear-leveling scheme can dynamically randomize the data addresses across the entire address space and obfuscate their actual locations from users and system software.</p>
phase change memory, security, wear leveling, dynamic address remapping
D. H. Woo, H. S. Lee and N. H. Seong, "Security Refresh: Protecting Phase-Change Memory against Malicious Wear Out," in IEEE Micro, vol. 31, no. , pp. 119-127, 2010.