Data remanence in Flash Memory Devices
|
|
|
- Rose Walsh
- 10 years ago
- Views:
Transcription
1 Data remanence in Flash Memory Devices Sergei Skorobogatov 1
2 Data remanence Residual representation of data after erasure Magnetic media SRAM and DRAM Low-temperature data remanence Long-term retention effects EEPROM and Flash Should be possible No information available Independent testing was performed 2
3 Non-volatile memories EEPROM and Flash Widely used in microcontrollers and smartcards Advantages Electrically programmable and erasable Internal charge pumps (no external high voltages necessary) High endurance (>100,000 E/W cycles) Long data retention (>40 years) Disadvantages Larger cell size than Mask ROM Flash erased in blocks Longer write/erase time than SRAM 3
4 Structure of non-volatile memories UV EPROM EEPROM Flash EEPROM 4
5 Data remanence in non-volatile memories EPROM, EEPROM and Flash Floating-gate transistors, e -, V TH = 3 4 V Levels of remanence threat File system (erasing a file undelete) File backup (software features) Smart memory (hardware buffers) Memory cell Possible outcomes Circumvention of microcontroller or smartcard security Information leakage through shared EEPROM areas between different applications in smartcards 5
6 Attacks on EPROM/EEPROM devices Erase with UV light followed by power glitching Memory and password/fuse are erased simultaneously V DD variation or power glitching Read sense circuit: V TH = K V DD, K ~ 0.5 Not suitable for 0.35 m and smaller technologies UV Eras e of PIC12C509 (old revision) VDD, V Tim e, m in EPROM OK EPROM erased Fuse erased 6
7 Attacks on EEPROM/Flash devices Electrical erase Memory and password are erased simultaneously Fast process (difficult to control erasure) V TH drops too low (power glitching does not work) Cell charge alteration does not work Voltage monitors and internally stabilized power supply Internal charge pumps and timing control Difficult to terminate the erase/programming cycle Electrical Erase of MSP430F VDD, V Time, us FLASH OK FLASH erased 7
8 Experimental part Is it possible to measure a V TH close to 0 V? Is any significant residual charge left after a normal erase operation? Is it possible to distinguish between neverprogrammed and programmed cells? Countermeasures? 8
9 Experimental part Data remanence evaluation in PIC16F84A 100 V precision power supply 1 s timing control 9
10 Measuring V TH close to 0 V in PIC16F84A Power glitch to reduce V ref to 0.5 V Exploiting after-erase discharging delay Accidentally discovered 5 years ago Shifts V TH up by V Apply both techniques simultaneously: V TH = K V DD V W V TH = V 10
11 Test residual charge after erase V TH = V ref = K V DD V W, K = 0.5, V W = 0.7 V Memory bulk erase cycles (5 V, 10 ms) Flash memory, 100 cycles: V TH = 100 mv EEPROM memory, 10 cycles: V TH = 1 mv Threshold Voltage Change During Erase Cycles V TH, V Number of Erase Cycles Programmed Fully erased 11
12 Recovering data from erased PIC16F84A Large difference in V TH between cells in the array Measure the cell s V TH before and after an extra erase cycle Threshold Voltage Distribution V TH, V Memory Address First erase Second erase 12
13 Never-programmed and programmed cells PIC16F84A comes programmed to all 0 s 10,000 erase cycles to fully discharge cells. Measure V TH Program to all 0 s, then another 10,000 erase cycles. Measure V TH Still noticeable change of V TH = 40 mv Threshold Voltage Distribution V TH, V Memory Address Programmed and erased Never programmed 13
14 Programming cells before erasure Cannot successfully recover information from PIC16F84A if it was programmed to all 0 s before the erase operation This is a standard procedure in some Flash and EEPROM devices: Intel ETOX Flash memory (P28F010) Microchip KeeLoq HCS200 Not used in modern EEPROM/Flash memory devices 14
15 Other ways of data remanence testing Semi-invasive approach (access to passivation layer) Measure changes inside memory transistors Influence on cell characteristics (V TH ) Influence on read-sense circuit (V ref ) Invasive approach (access through passivation layer) Modify the read-sense circuit of the memory Direct connection to internal memory lines 15
16 Semi-invasive testing Test setup Focusing the laser (100x objective) 16
17 Semi-invasive testing Images of the PIC16F84A EEPROM (0.9 m, 2M) Change V ref = f(p L ) to measure V TH Optical Laser scanned (OBIC) 17
18 Semi-invasive testing Images of the ATmega8 EEPROM (0.35 m, 3M) Optical Optical after deprocessing Laser scanned (OBIC) 18
19 Semi-invasive testing Focus a laser on the ATmega8 die using a 100x objective in order to change V ref Less successful (<10% after one erase cycle) due to multiple metal layers and polished insulation layers 19
20 Countermeasures Cycle EEPROM/Flash times with new random data before writing sensitive information to them Program (charge) all EEPROM/Flash cells before erasing them Remember about intelligent memories, backup and temporary files in file systems Remember that memory devices are identical within the same family: everything which is valid for PIC16F84A will work for PIC16F627/628, PIC16F870/871/872 and PIC16F873/874/876/877 Use latest high-density devices, as smaller scales make semiinvasive attacks less feasible Cryptography can help to make data recovery more difficult. E.g. store longer pre-key R instead of key: K=h(R) 20
21 Conclusions Floating-gate memories (EPROM, EEPROM and Flash) have data-remanence problems Information from some samples can be recovered even after 100 erase cycles Even where the residual charge cannot yet be detected with existing methods, future technologies may permit this Secure devices should be tested for dataremanence effects 21
Local Heating Attacks on Flash Memory Devices. Dr Sergei Skorobogatov
Local Heating Attacks on Flash Memory Devices Dr Sergei Skorobogatov http://www.cl.cam.ac.uk/~sps32 email: [email protected] Introduction Semi-invasive attacks were introduced in 2002 ( Optical fault induction
Algorithms and Methods for Distributed Storage Networks 3. Solid State Disks Christian Schindelhauer
Algorithms and Methods for Distributed Storage Networks 3. Solid State Disks Institut für Informatik Wintersemester 2007/08 Solid State Disks Motivation 2 10 5 1980 1985 1990 1995 2000 2005 2010 PRODUCTION
Physical Attacks on Tamper Resistance: Progress and Lessons
Physical Attacks on Tamper Resistance: Progress and Lessons Dr Sergei Skorobogatov http://www.cl.cam.ac.uk/~sps32 email: [email protected] Why do we need tamper resistance? Theft of service: unauthorised
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
With respect to the way of data access we can classify memories as:
Memory Classification With respect to the way of data access we can classify memories as: - random access memories (RAM), - sequentially accessible memory (SAM), - direct access memory (DAM), - contents
Tamper resistance and hardware security. Dr Sergei Skorobogatov
Tamper resistance and hardware security Dr Sergei Skorobogatov http://www.cl.cam.ac.uk/~sps32 email: [email protected] Talk Outline Introduction Attack awareness Tamper protection levels Attack methods Non-invasive
RAM & ROM Based Digital Design. ECE 152A Winter 2012
RAM & ROM Based Digital Design ECE 152A Winter 212 Reading Assignment Brown and Vranesic 1 Digital System Design 1.1 Building Block Circuits 1.1.3 Static Random Access Memory (SRAM) 1.1.4 SRAM Blocks in
Chapter 9 Semiconductor Memories. Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan
Chapter 9 Semiconductor Memories Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan Advanced Reliable Systems (ARES) Lab. Jin-Fu Li, EE, NCU 2 Outline Introduction
Module 2. Embedded Processors and Memory. Version 2 EE IIT, Kharagpur 1
Module 2 Embedded Processors and Memory Version 2 EE IIT, Kharagpur 1 Lesson 5 Memory-I Version 2 EE IIT, Kharagpur 2 Instructional Objectives After going through this lesson the student would Pre-Requisite
Handout 17. by Dr Sheikh Sharif Iqbal. Memory Unit and Read Only Memories
Handout 17 by Dr Sheikh Sharif Iqbal Memory Unit and Read Only Memories Objective: - To discuss different types of memories used in 80x86 systems for storing digital information. - To learn the electronic
Atmel s Self-Programming Flash Microcontrollers
Atmel s Self-Programming Flash Microcontrollers By Odd Jostein Svendsli, Marketing Manager Summary The third-generation Flash microcontrollers from Atmel are now available. These microcontrollers offer
Semiconductor Memories
Semiconductor Memories Semiconductor memories array capable of storing large quantities of digital information are essential to all digital systems Maximum realizable data storage capacity of a single
AN1837. Non-Volatile Memory Technology Overview By Stephen Ledford Non-Volatile Memory Technology Center Austin, Texas.
Order this document by /D Non-Volatile Memory Technology Overview By Stephen Ledford Non-Volatile Memory Technology Center Austin, Texas Introduction Today s microcontroller applications are more sophisticated
Memory. The memory types currently in common usage are:
ory ory is the third key component of a microprocessor-based system (besides the CPU and I/O devices). More specifically, the primary storage directly addressed by the CPU is referred to as main memory
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD Olivier THOMAS Blackhat USA 2015 About Texplained Texplained [Technology Explained] refers
Read-only memory Implementing logic with ROM Programmable logic devices Implementing logic with PLDs Static hazards
Points ddressed in this Lecture Lecture 8: ROM Programmable Logic Devices Professor Peter Cheung Department of EEE, Imperial College London Read-only memory Implementing logic with ROM Programmable logic
On a New Way to Read Data from Memory
On a New Way to Read Data from Memory David Samyde 1, Sergei Skorobogatov 2, Ross Anderson 2 and Jean-Jacques Quisquater 1 1: Université catholique de Louvain, UCL Crypto Group Place du Levant, 3, B-1348
Computer Systems Structure Main Memory Organization
Computer Systems Structure Main Memory Organization Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Storage/Memory
1 / 25. CS 137: File Systems. Persistent Solid-State Storage
1 / 25 CS 137: File Systems Persistent Solid-State Storage Technology Change is Coming Introduction Disks are cheaper than any solid-state memory Likely to be true for many years But SSDs are now cheap
NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ
What is NAND Flash? What is the major difference between NAND Flash and other Memory? Structural differences between NAND Flash and NOR Flash What does NAND Flash controller do? How to send command to
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
A N. O N Output/Input-output connection
Memory Types Two basic types: ROM: Read-only memory RAM: Read-Write memory Four commonly used memories: ROM Flash, EEPROM Static RAM (SRAM) Dynamic RAM (DRAM), SDRAM, RAMBUS, DDR RAM Generic pin configuration:
Secure Hardware PV018 Masaryk University Faculty of Informatics
Secure Hardware PV018 Masaryk University Faculty of Informatics Jan Krhovják Vašek Matyáš Roadmap Introduction The need of secure HW Basic terminology Architecture Cryptographic coprocessors/accelerators
Homework # 2. Solutions. 4.1 What are the differences among sequential access, direct access, and random access?
ECE337 / CS341, Fall 2005 Introduction to Computer Architecture and Organization Instructor: Victor Manuel Murray Herrera Date assigned: 09/19/05, 05:00 PM Due back: 09/30/05, 8:00 AM Homework # 2 Solutions
8-bit Microcontroller. Application Note. AVR105: Power Efficient High Endurance Parameter Storage in Flash Memory
AVR105: Power Efficient High Endurance Parameter Storage in Flash Memory Features Fast Storage of Parameters High Endurance Flash Storage 350K Write Cycles Power Efficient Parameter Storage Arbitrary Size
FLASH TECHNOLOGY DRAM/EPROM. Flash. 1980 1982 1984 1986 1988 1990 1992 1994 1996 Year Source: Intel/ICE, "Memory 1996"
10 FLASH TECHNOLOGY Overview Flash memory technology is a mix of EPROM and EEPROM technologies. The term flash was chosen because a large chunk of memory could be erased at one time. The name, therefore,
Memory Basics. SRAM/DRAM Basics
Memory Basics RAM: Random Access Memory historically defined as memory array with individual bit access refers to memory with both Read and Write capabilities ROM: Read Only Memory no capabilities for
90nm e-page Flash for Machine to Machine Applications
90nm e-page Flash for Machine to Machine Applications François Maugain, Jean Devin Microcontrollers, Memories & Secure MCUs Group 90nm e-page Flash for M2M applications Outline M2M Market Cycling Endurance
Flash Memories. João Pela (52270), João Santos (55295) December 22, 2008 IST
Flash Memories João Pela (52270), João Santos (55295) IST December 22, 2008 João Pela (52270), João Santos (55295) (IST) Flash Memories December 22, 2008 1 / 41 Layout 1 Introduction 2 How they work 3
Hardware Security of Semiconductor Chips: Progress and Lessons. Dr Sergei Skorobogatov
Hardware Security of Semiconductor Chips: Progress and Lessons Dr Sergei Skorobogatov http://www.cl.cam.ac.uk/~sps32 email: [email protected] Introduction Attack scenarios on secure systems theft of service
Chapter 5 :: Memory and Logic Arrays
Chapter 5 :: Memory and Logic Arrays Digital Design and Computer Architecture David Money Harris and Sarah L. Harris Copyright 2007 Elsevier 5- ROM Storage Copyright 2007 Elsevier 5- ROM Logic Data
SLC vs MLC: Proper Flash Selection for SSDs in Industrial, Military and Avionic Applications. A TCS Space & Component Technology White Paper
SLC vs MLC: Proper Flash Selection for SSDs in Industrial, Military and Avionic Applications A TCS Space & Component Technology White Paper Introduction As with most storage technologies, NAND Flash vendors
SLC vs MLC NAND and The Impact of Technology Scaling. White paper CTWP010
SLC vs MLC NAND and The mpact of Technology Scaling White paper CTWP010 Cactus Technologies Limited Suite C, 15/F, Capital Trade Center 62 Tsun Yip Street, Kwun Tong Kowloon, Hong Kong Tel: +852-2797-2277
ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-17: Memory organisation, and types of memory
ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-17: Memory organisation, and types of memory 1 1. Memory Organisation 2 Random access model A memory-, a data byte, or a word, or a double
SLC vs MLC: Which is best for high-reliability apps?
SLC vs MLC: Which is best for high-reliability apps? Here's an examination of trade-offs, with an emphasis on how they affect the reliability of storage targeted at industrial, military and avionic applications.
NVM memory: A Critical Design Consideration for IoT Applications
NVM memory: A Critical Design Consideration for IoT Applications Jim Lipman Sidense Corp. Introduction The Internet of Things (IoT), sometimes called the Internet of Everything (IoE), refers to an evolving
Security & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
Solid State Technology What s New?
Solid State Technology What s New? Dennis Martin, President, Demartek www.storagedecisions.com Agenda: Solid State Technology What s New? Demartek About Us Solid-state storage overview Types of NAND flash
1. Memory technology & Hierarchy
1. Memory technology & Hierarchy RAM types Advances in Computer Architecture Andy D. Pimentel Memory wall Memory wall = divergence between CPU and RAM speed We can increase bandwidth by introducing concurrency
Memory Testing. Memory testing.1
Memory Testing Introduction Memory Architecture & Fault Models Test Algorithms DC / AC / Dynamic Tests Built-in Self Testing Schemes Built-in Self Repair Schemes Memory testing.1 Memory Market Share in
Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?
Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers
Low- Cost Chip Microprobing
Low- Cost Chip Microprobing Philipp Maier Karsten Nohl SRLabs Template v11 A few smart cards chips cover numerous security domains Security chip applica.ons Payment
Chapter 8 Memory Units
Chapter 8 Memory Units Contents: I. Introduction Basic units of Measurement II. RAM,ROM,PROM,EPROM Storage versus Memory III. Auxiliary Storage Devices-Magnetic Tape, Hard Disk, Floppy Disk IV.Optical
Chapter 7 Memory and Programmable Logic
NCNU_2013_DD_7_1 Chapter 7 Memory and Programmable Logic 71I 7.1 Introduction ti 7.2 Random Access Memory 7.3 Memory Decoding 7.5 Read Only Memory 7.6 Programmable Logic Array 77P 7.7 Programmable Array
Data Distribution Algorithms for Reliable. Reliable Parallel Storage on Flash Memories
Data Distribution Algorithms for Reliable Parallel Storage on Flash Memories Zuse Institute Berlin November 2008, MEMICS Workshop Motivation Nonvolatile storage Flash memory - Invented by Dr. Fujio Masuoka
NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12. Issue Date: 15 December 2014 Revised:
NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12 Issue Date: 15 December 2014 Revised: NSA/CSS STORAGE DEVICE SANITIZATION MANUAL PURPOSE AND SCOPE This manual provides guidance
Yaffs NAND Flash Failure Mitigation
Yaffs NAND Flash Failure Mitigation Charles Manning 2012-03-07 NAND flash is one of very few types of electronic device which are knowingly shipped with errors and are expected to generate further errors
File Management Backing up files
What is Backup and why is it done? The word backup refers to making copies of data so that these additional copies may be used to restore the original data in the event of data loss. Basically backups
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
Computers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer
Computers CMPT 125: Lecture 1: Understanding the Computer Tamara Smyth, [email protected] School of Computing Science, Simon Fraser University January 3, 2009 A computer performs 2 basic functions: 1.
Embedded Systems Design Course Applying the mbed microcontroller
Embedded Systems Design Course Applying the mbed microcontroller Memory and data management These course notes are written by R.Toulson (Anglia Ruskin University) and T.Wilmshurst (University of Derby).
Low Power and Reliable SRAM Memory Cell and Array Design
Springer Series in Advanced Microelectronics 31 Low Power and Reliable SRAM Memory Cell and Array Design Bearbeitet von Koichiro Ishibashi, Kenichi Osada 1. Auflage 2011. Buch. XI, 143 S. Hardcover ISBN
Two Flash Technologies Compared: NOR vs NAND
White Paper Two Flash Technologies Compared: NOR vs NAND Written by: Arie Tal OCTOBER 02 91-SR-012-04-8L REV. 1.0 Introduction Two main technologies dominate the non-volatile flash memory market today:
Unexpected Power Loss Protection
White Paper SanDisk Corporation Corporate Headquarters 951 SanDisk Drive Milpitas, CA 95035, U.S.A. Phone +1.408.801.1000 Fax +1.408.801.8657 www.sandisk.com Table of Contents Executive Summary 3 Overview
Implementation Of High-k/Metal Gates In High-Volume Manufacturing
White Paper Implementation Of High-k/Metal Gates In High-Volume Manufacturing INTRODUCTION There have been significant breakthroughs in IC technology in the past decade. The upper interconnect layers of
Trabajo 4.5 - Memorias flash
Memorias flash II-PEI 09/10 Trabajo 4.5 - Memorias flash Wojciech Ochalek This document explains the concept of flash memory and describes it s the most popular use. Moreover describes also Microdrive
2.0 Command and Data Handling Subsystem
2.0 Command and Data Handling Subsystem The Command and Data Handling Subsystem is the brain of the whole autonomous CubeSat. The C&DH system consists of an Onboard Computer, OBC, which controls the operation
SLC vs. MLC: An Analysis of Flash Memory
SLC vs. MLC: An Analysis of Flash Memory Examining the Quality of Memory: Understanding the Differences between Flash Grades Table of Contents Abstract... 3 Introduction... 4 Flash Memory Explained...
IEEE Milestone Proposal: Creating the Foundation of the Data Storage Flash Memory Industry
Abstract Flash memory used for mass data storage has supplanted the photographic film and floppy disk markets. It has also largely replaced the use of magnetic tape, CD, DVD and magnetic hard disk drives
Endurance Models for Cactus Technologies Industrial-Grade Flash Storage Products. White Paper CTWP006
Endurance Models for Cactus Technologies Industrial-Grade Flash Storage Products White Paper CTWP006 Cactus Technologies Limited Suite C, 15/F, Capital Trade Center 6 Tsun Yip Street, Kwun Tong Kowloon,
Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
Allows the user to protect against inadvertent write operations. Device select and address bytes are Acknowledged Data Bytes are not Acknowledged
Write Protect CAT24WCxxx I 2 C Serial EEPROMs. Allows the user to protect against inadvertent write operations. WP = V CC : Write Protected Device select and address bytes are Acknowledged Data Bytes are
Tamper resistant devices
Foundations of Secure e-commerce (bmevihim219) Dr. Levente Buttyán Associate Professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) [email protected],
Chip Card & Security ICs Mifare NRG SLE 66R35
Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information
Main Memory & Backing Store. Main memory backing storage devices
Main Memory & Backing Store Main memory backing storage devices 1 Introduction computers store programs & data in two different ways: nmain memory ntemporarily stores programs & data that are being processed
Chapter 8. Secondary Storage. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 8 Secondary Storage McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Distinguish between primary and secondary storage Describe
MirrorBit Technology: The Foundation for Value-Added Flash Memory Solutions FLASH FORWARD
MirrorBit Technology: The Foundation for Value-Added Flash Memory Solutions FLASH FORWARD MirrorBit Technology: The Future of Flash Memory is Here Today Spansion is redefining the Flash memory industry
Data Retention in MLC NAND Flash Memory: Characterization, Optimization, and Recovery
Data Retention in MLC NAND Flash Memory: Characterization, Optimization, and Recovery Yu Cai, Yixin Luo, Erich F. Haratsch*, Ken Mai, Onur Mutlu Carnegie Mellon University, *LSI Corporation 1 Many use
Nanotechnologies for the Integrated Circuits
Nanotechnologies for the Integrated Circuits September 23, 2015 Dr. Bertrand Cambou Professor of Practice NAU, Cybersecurity School of Informatics, Computing, and Cyber-Systems Agenda The Market Silicon
Programming Matters. MLC NAND Reliability and Best Practices for Data Retention. Data I/O Corporation. Anthony Ambrose President & CEO
Programming Matters MLC NAND Reliability and Best Practices for Data Retention Data I/O Corporation Anthony Ambrose President & CEO Flash Memory Summit 2013 Santa Clara, CA 1 Executive Summary As Process
8-Bit Flash Microcontroller for Smart Cards. AT89SCXXXXA Summary. Features. Description. Complete datasheet available under NDA
Features Compatible with MCS-51 products On-chip Flash Program Memory Endurance: 1,000 Write/Erase Cycles On-chip EEPROM Data Memory Endurance: 100,000 Write/Erase Cycles 512 x 8-bit RAM ISO 7816 I/O Port
AN886 APPLICATION NOTE
INTRODUCTION AN886 APPLICATION NOTE SELECTING BETWEEN, FAST AND OTP FOR A MICROCONTROLLER by Microcontroller Division Applications A customer who develops an MCU-based application needs various levels
Smart Automated Conference Room System
Smart Automated Conference Room System Prof. P. P. Chitte 1, R. R. Shinde 2, S. V. Thosar 3 1 Assistant Professor, P.R.E.C. Loni, India 2,3 Student, P.R.E.C. Loni, India Abstract: In video conference system
Here are my slides from lecture, along with my notes about each slide.
Chapter 3: Storage Here are my slides from lecture, along with my notes about each slide. NOTE: You are expected to attend all class meetings. Please be in the room when class begins and be ready to participate
Understanding Memory TYPES OF MEMORY
Understanding Memory TYPES OF MEMORY In this study unit, you ll learn about physical and logical memory. Physical memory comes in two types, random access memory (RAM) and read-only memory (ROM). Typically,
Chapter 1 Lesson 3 Hardware Elements in the Embedded Systems. 2008 Chapter-1L03: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education
Chapter 1 Lesson 3 Hardware Elements in the Embedded Systems 1 Typical Embedded System Hardware units 2 Basic Circuit Elements at the System 3 (i) Power Source 1. System own supply with separate supply
ConnectKey 2.0 WorkCentre 6655i 6655
ConnectKey 2.0 WorkCentre 6655i 6655 Statement of Volatility Version 1.0 2016 Xerox Corporation. All rights reserved. Xerox and the sphere of connectivity design are trademarks of Xerox Corporation in
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
A Flash Storage Technical. and. Economic Primer. and. By Mark May Storage Consultant, By James Green, vexpert Virtualization Consultant
A Flash Storage Technical and Economic Primer y Mark May Storage Consultant, y James Green, vexpert Virtualization Consultant and Scott D. Lowe, vexpert Co-Founder, ActualTech Media March, 2015 Table of
CSCA0201 FUNDAMENTALS OF COMPUTING. Chapter 5 Storage Devices
CSCA0201 FUNDAMENTALS OF COMPUTING Chapter 5 Storage Devices 1 1. Computer Data Storage 2. Types of Storage 3. Storage Device Features 4. Other Examples of Storage Device 2 Storage Devices A storage device
Features. Instruction. Decoder Control Logic, And Clock Generators. Address Compare amd Write Enable. Protect Register V PP.
February 1999 NM9366 (MICROWIRE Bus Interface) 4096-Bit Serial EEPROM General Description The NM9366 devices are 4096 bits of CMOS non-volatile electrically erasable memory divided into 256 16-bit registers.
Sequential Circuit Design
Sequential Circuit Design Lan-Da Van ( 倫 ), Ph. D. Department of Computer Science National Chiao Tung University Taiwan, R.O.C. Fall, 2009 [email protected] http://www.cs.nctu.edu.tw/~ldvan/ Outlines
Evo Laser Firmware Developer s Manual
Evo Laser Firmware Developer s Manual Table of Content Chapter 1 Introduction Chapter 2 Hardware Overview and Subsystems 2.1 Overview 2.2 Evo Laser Hardware Core System 2.3 Evo Laser Smartport TM Chapter
Flash Memory Jan Genoe KHLim Universitaire Campus, Gebouw B 3590 Diepenbeek Belgium
Flash Memory Jan Genoe KHLim Universitaire Campus, Gebouw B 3590 Diepenbeek Belgium http://www.khlim.be/~jgenoe [1] http://en.wikipedia.org/wiki/flash_memory Geheugen 1 Product evolution Jan Genoe: Geheugen
EXERCISE 3: String Variables and ASCII Code
EXERCISE 3: String Variables and ASCII Code EXERCISE OBJECTIVE When you have completed this exercise, you will be able to describe the use of string variable and ASCII code. You will use Flowcode and the
The modular concept of the MPA-3 system is designed to enable easy accommodation to a huge variety of experimental requirements.
HARDWARE DESCRIPTION The modular concept of the MPA-3 system is designed to enable easy accommodation to a huge variety of experimental requirements. BASE MODULE GO LINE Digital I/O 8 Analog Out AUX 1
TECHNOLOGY BRIEF. Compaq RAID on a Chip Technology EXECUTIVE SUMMARY CONTENTS
TECHNOLOGY BRIEF August 1999 Compaq Computer Corporation Prepared by ISSD Technology Communications CONTENTS Executive Summary 1 Introduction 3 Subsystem Technology 3 Processor 3 SCSI Chip4 PCI Bridge
Data Recovery - What is possible to recover and how? Data Erasure - How to erase information in a secure way. Åke Ljungqvist, Country Manager Sweden
Data Recovery - What is possible to recover and how? Data Erasure - How to erase information in a secure way Åke Ljungqvist, Country Manager Sweden Who is Ibas? Norway... Recovery of hard drives after
Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
Emulated EEPROM Implementation in Dual Flash Architecture on MC9S08LG32 With Demo Description
Freescale Semiconductor Application Note Document Number: AN3822 Rev. 0, 2/2009 Emulated EEPROM Implementation in Dual Flash Architecture on MC9S08LG32 With Demo Description by: Saurabh Jhamb Reference
Technical Note. NOR Flash Cycling Endurance and Data Retention. Introduction. TN-12-30: NOR Flash Cycling Endurance and Data Retention.
Technical Note TN-12-30: NOR Flash Cycling Endurance and Data Retention Introduction NOR Flash Cycling Endurance and Data Retention Introduction NOR Flash memory is subject to physical degradation that
Chapter 1 Introduction to The Semiconductor Industry 2005 VLSI TECH. 1
Chapter 1 Introduction to The Semiconductor Industry 1 The Semiconductor Industry INFRASTRUCTURE Industry Standards (SIA, SEMI, NIST, etc.) Production Tools Utilities Materials & Chemicals Metrology Tools
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
How To Program A Microcontroller With Memory On A Microchip Microcontroller
Getting Started with On-chip Memory 2001 Microchip Technology Incorporated. All Rights Reserved. S0001A RAM/ROM(x14) 1 In this Getting Started tutorial you will learn about the various memory types found
Features INSTRUCTION DECODER CONTROL LOGIC AND CLOCK GENERATORS COMPARATOR AND WRITE ENABLE EEPROM ARRAY READ/WRITE AMPS 16
July 2000 FM9346 (MICROWIRE Bus Interface) 1024- Serial EEPROM General Description FM9346 is a 1024-bit CMOS non-volatile EEPROM organized as 64 x 16-bit array. This device features MICROWIRE interface
Non-Volatile Memory. Non-Volatile Memory & its use in Enterprise Applications. Contents
Non-Volatile Memory Non-Volatile Memory & its use in Enterprise Applications Author: Adrian Proctor, Viking Technology [email: [email protected]] This paper reviews different memory technologies,
