• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xu Yuanchao, Yan Junfeng, Wan Hu, Sun Fengyun, Zhang Weigong, Li Tao. A Survey on Security and Privacy of Emerging Non-Volatile Memory[J]. Journal of Computer Research and Development, 2016, 53(9): 1930-1942. DOI: 10.7544/issn1000-1239.2016.20150581
Citation: Xu Yuanchao, Yan Junfeng, Wan Hu, Sun Fengyun, Zhang Weigong, Li Tao. A Survey on Security and Privacy of Emerging Non-Volatile Memory[J]. Journal of Computer Research and Development, 2016, 53(9): 1930-1942. DOI: 10.7544/issn1000-1239.2016.20150581

A Survey on Security and Privacy of Emerging Non-Volatile Memory

More Information
  • Published Date: August 31, 2016
  • In recent years, emerging non-volatile memory (NVM) technologies, such as phase change memory (PCM), spin-transfer torque RAM (STT-RAM), and memristor have gained great attention of researchers. NVM has both byte-addressable and non-volatile features, thereby making it possible to replace both traditional main memory and persistent storage. Also, NVM can be used in hybrid memory and storage architecture. Due to the advantages of low latency, high density, and low power, NVM has become the promising memory technology because of the effect of alleviating memory wall problem. However, applications can access NVM directly through ordinary load/store interface, and more important, data resided in the NVM still retains after power loss, thus it imposes new challenges of security and privacy. This paper surveys several security problems about NVM and existing solutions including persistent memory leak, stray writes, metadata security, malicious wearout attacks, and non-volatile pointer. Then, privacy issues and existing studies about NVM, such as data protection and information leaks, are discussed. Finally, we explore other potential security and privacy issues related to NVM and propose several possible solutions, such as convergence of permission and protection, security of non-volatile cache, volatile NVM, and program security.
  • Related Articles

    [1]Yue Wenjing, Qu Wenwen, Lin Kuan, Wang Xiaoling. Survey of Cardinality Estimation Techniques Based on Machine Learning[J]. Journal of Computer Research and Development, 2024, 61(2): 413-427. DOI: 10.7544/issn1000-1239.202220649
    [2]Chen Zhenzhu, Zhou Chunyi, Su Mang, Gao Yansong, Fu Anmin. Research Progress of Secure Outsourced Computing for Machine Learning[J]. Journal of Computer Research and Development, 2023, 60(7): 1450-1466. DOI: 10.7544/issn1000-1239.202220767
    [3]Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin. Security Issues and Privacy Preserving in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    [4]Chen Kerui, Meng Xiaofeng. Interpretation and Understanding in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(9): 1971-1986. DOI: 10.7544/issn1000-1239.2020.20190456
    [5]Liu Chenyi, Xu Mingwei, Geng Nan, Zhang Xiang. A Survey on Machine Learning Based Routing Algorithms[J]. Journal of Computer Research and Development, 2020, 57(4): 671-687. DOI: 10.7544/issn1000-1239.2020.20190866
    [6]Liu Junxu, Meng Xiaofeng. Survey on Privacy-Preserving Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(2): 346-362. DOI: 10.7544/issn1000-1239.2020.20190455
    [7]Ji Shouling, Li Jinfeng, Du Tianyu, Li Bo. Survey on Techniques, Applications and Security of Machine Learning Interpretability[J]. Journal of Computer Research and Development, 2019, 56(10): 2071-2096. DOI: 10.7544/issn1000-1239.2019.20190540
    [8]Meng Xiaofeng, Ma Chaohong, Yang Chen. Survey on Machine Learning for Database Systems[J]. Journal of Computer Research and Development, 2019, 56(9): 1803-1820. DOI: 10.7544/issn1000-1239.2019.20190446
    [9]Xu Xiaoxiang, Li Fanzhang, Zhang Li, Zhang Zhao. The Category Representation of Machine Learning Algorithm[J]. Journal of Computer Research and Development, 2017, 54(11): 2567-2575. DOI: 10.7544/issn1000-1239.2017.20160350
    [10]Wen Guihua. Relative Transformation for Machine Learning[J]. Journal of Computer Research and Development, 2008, 45(4): 612-618.

Catalog

    Article views (1560) PDF downloads (790) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return