The Community for Technology Leaders
Green Image
Issue No. 01 - January/February (2011 vol. 31)
ISSN: 0272-1732
pp: 119-127
Dong Hyuk Woo , Intel Labs
Hsien-Hsin S. Lee , Georgia Institute of Technology
Nak Hee Seong , Georgia Institute of Technology
ABSTRACT
<p>As dynamic RAM scaling approaches its physical limit, phase-change memory is the most mature and well-studied option for potential DRAM replacement. However, malicious wear-out attacks can exploit PCM's limited write endurance. To address this, a low-cost wear-leveling scheme can dynamically randomize the data addresses across the entire address space and obfuscate their actual locations from users and system software.</p>
INDEX TERMS
phase change memory, security, wear leveling, dynamic address remapping
CITATION
Dong Hyuk Woo, Hsien-Hsin S. Lee, Nak Hee Seong, "Security Refresh: Protecting Phase-Change Memory against Malicious Wear Out", IEEE Micro, vol. 31, no. , pp. 119-127, January/February 2011, doi:10.1109/MM.2010.101
109 ms
(Ver )