The Community for Technology Leaders
Green Image
Issue No. 01 - January/February (2011 vol. 31)
ISSN: 0272-1732
pp: 119-127
Nak Hee Seong , Georgia Institute of Technology
Dong Hyuk Woo , Intel Labs
Hsien-Hsin S. Lee , Georgia Institute of Technology
<p>As dynamic RAM scaling approaches its physical limit, phase-change memory is the most mature and well-studied option for potential DRAM replacement. However, malicious wear-out attacks can exploit PCM's limited write endurance. To address this, a low-cost wear-leveling scheme can dynamically randomize the data addresses across the entire address space and obfuscate their actual locations from users and system software.</p>
phase change memory, security, wear leveling, dynamic address remapping

D. H. Woo, H. S. Lee and N. H. Seong, "Security Refresh: Protecting Phase-Change Memory against Malicious Wear Out," in IEEE Micro, vol. 31, no. , pp. 119-127, 2010.
85 ms
(Ver 3.3 (11022016))