Improving the security of a 6T SRAM using body-biasing in 28 nm FD-SOI

Robert Giterman, Osnat Keren, Alexander Fish

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Power analysis attacks have become a major threat to security systems by enabling secret data extraction through the analysis of the current consumed by the supply voltage. Embedded memories, implemented with 6T SRAM cells serve as key components of many security systems. However, the leakage current consumption of 6T SRAM cells is correlated with their stored data, resulting in susceptibility to leakage power analysis attacks. In this paper, we propose exploiting the body bias capabilities of FD-SOI technology to reduce the correlation between the consumed current and data stored in the memory by modifying the body voltage during runtime. Simulation results in 28nm FD-SOI technology demonstrate a significant reduction in the information leakage of a body-biased six-transistor (6T) static random access memory (SRAM) without additional area overhead.

Original languageEnglish
Title of host publication2018 IEEE SOI-3D-Subthreshold Microelectronics Technology Unified Conference, S3S 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538676264
DOIs
StatePublished - 2 Jul 2018
Event2018 IEEE SOI-3D-Subthreshold Microelectronics Technology Unified Conference, S3S 2018 - Burlingame, United States
Duration: 15 Oct 201818 Oct 2018

Publication series

Name2018 IEEE SOI-3D-Subthreshold Microelectronics Technology Unified Conference, S3S 2018

Conference

Conference2018 IEEE SOI-3D-Subthreshold Microelectronics Technology Unified Conference, S3S 2018
Country/TerritoryUnited States
CityBurlingame
Period15/10/1818/10/18

Bibliographical note

Publisher Copyright:
© 2018 IEEE.

Fingerprint

Dive into the research topics of 'Improving the security of a 6T SRAM using body-biasing in 28 nm FD-SOI'. Together they form a unique fingerprint.

Cite this