{"id":13788,"date":"2023-06-15T16:08:09","date_gmt":"2023-06-15T13:08:09","guid":{"rendered":"https:\/\/www.weebit-nano.com\/?p=13788"},"modified":"2025-06-25T14:16:15","modified_gmt":"2025-06-25T11:16:15","slug":"setting-a-foundationfor-security-with-reram","status":"publish","type":"post","link":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/","title":{"rendered":"Setting a Foundation<br>for Security with ReRAM"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-13787 size-large\" src=\"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1-1024x683.png\" alt=\"\" width=\"800\" height=\"534\" srcset=\"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1-1024x683.png 1024w, https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1-300x200.png 300w, https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1-768x512.png 768w, https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1-1536x1024.png 1536w, https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1-2048x1366.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Today we are surrounded by an ever-increasing array of connected devices. Electronic payments are becoming more popular, and we are keeping more and more personal information in the cloud. At the same time, risks continue to rise as hackers get better and better at breaking down security schemes.<\/p>\n<p>Regardless of the end application, security must be based on a multi-layered approach starting with the deepest embedded hardware. This starts within the manufacturing process of the chips themselves and includes a broad range of hardware primitives serving as security keys such as True Random Number Generator (TRNG) and physical unclonable functions (PUFs).<\/p>\n<p><strong>Security founded on manufacturing variations<\/strong><\/p>\n<p>A PUF is a technique that leverages the inherent physical variations in manufacturing processes to generate unique and unpredictable responses for each individual chip. Each instance of a hardware device exhibits slight variations in its electrical characteristics due to manufacturing variations, such as transistor size, doping levels, and other process parameters, and these variations can create a unique \u2018fingerprint\u2019 for each device. This hardware-based mechanism can be used to establish trust and ensure the uniqueness of each device without the need for stored secrets or traditional cryptographic algorithms.<\/p>\n<p>PUFs are getting increasing attention as a hardware approach for information security in IoT devices. Since IoT devices have constrained area and power requirements and are often deployed in harsh environments, it is critical that the PUF be cost-efficient in terms of area per bit, and reliable with low bit error rate (BER).<\/p>\n<p>PUFs can be based on a range of characteristics implemented on <a href=\"https:\/\/www.weebit-nano.com\/definition\/cmos\/\" target=\"_blank\" rel=\"noopener\">CMOS<\/a> technology. Examples of strong PUFs are those based on ring oscillators while weaker PUFs are based on <a href=\"https:\/\/www.weebit-nano.com\/definition\/sram\/\" target=\"_blank\" rel=\"noopener\">SRAM<\/a>, Butterfly, and Flip-flops. Since these are all implemented on CMOS, they require large area, and also face difficulties in scaling beyond 10nm. Such conventional PUF schemes generally suffer from poor area efficiency and high BER under process, voltage and temperature (PVT) variations. While stabilization and error correction techniques can help to improve the output reliability, they result in considerable costs in area and power.<\/p>\n<p><strong>ReRAM \u2013 an inherently secure technology<\/strong><\/p>\n<p><a href=\"https:\/\/www.weebit-nano.com\/definition\/reram-or-rram\/\" target=\"_blank\" rel=\"noopener\">ReRAM<\/a> (or <a href=\"https:\/\/www.weebit-nano.com\/definition\/rram\/\" target=\"_blank\" rel=\"noopener\">RRAM<\/a>) has been investigated to implement efficient PUFs by using inherent variations in storage resistance, switching time and nonlinearity.<\/p>\n<p>In addition, ReRAM has inherent physical attributes that enable it to protect its content from hacking attacks and make it more difficult to reverse engineer. Since ReRAM does not use any charges or other particles like flash does, it is more difficult to sense or change its internal state using electron beams. ReRAM can also easily withstand magnetic attacks because it is immune to electromagnetic fields. Because the ReRAM bit cell is deeply embedded between two metal layers integrated at the back-end-of-line (<a href=\"https:\/\/www.weebit-nano.com\/definition\/beol-memory\/\" target=\"_blank\" rel=\"noopener\">BEOL<\/a>), it is also more immune to optical (laser) attacks. In addition, careful design of Weebit ReRAM cells and their associated control logic enables a balanced power profile which makes it less vulnerable to power analysis hacking.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-11895\" src=\"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2022\/05\/module-copy-1.svg\" alt=\"\" width=\"600\" height=\"480\" \/><\/p>\n<p style=\"text-align: center;\"><em>Above: The ReRAM bit cell is deeply embedded between two<br \/>\nmetal layers integrated at the back-end-of-line (BEOL)<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Given all of this, ReRAM is an ideal solution for PUFs and other security mechanisms. In addition, ReRAM requires less area than traditional PUF schemes because it is integrated in BEOL.<\/p>\n<p>At the recent <a href=\"https:\/\/www.ewh.ieee.org\/soc\/eds\/imw\/\" target=\"_blank\" rel=\"noopener\">International Memory Workshop<\/a>, I presented a poster session based on a new paper written by technologists from the <a href=\"https:\/\/home.iitd.ac.in\/\" target=\"_blank\" rel=\"noopener\">Indian Institute of Technology Delhi<\/a>, led by Prof Manan Suri and Vivek <u>Parmar<\/u>, <a href=\"https:\/\/www.leti-cea.com\/cea-tech\/leti\/english\/Pages\/Welcome.aspx\" target=\"_blank\" rel=\"noopener\">CEA-Let<\/a>i and Weebit. The paper presents a ReRAM PUF with excellent reliability, demonstrating immunity to modern ML-based SCA (side-channel-attacks) by introducing a secondary low-energy HRS (high-resistance state) programming step.<\/p>\n<p>&nbsp;<\/p>\n<p>The paper highlights the benefits of using Weebit ReRAM to provide PUF capability. In it, we successfully demonstrate and validate the design of a 2T-2R based PUF over a large array of 16Kb developed using Weebit\u2019s technology by exploiting Vform variability between devices in consecutive rows. The design is validated for two different ReRAM stacks at 130nm and using one stack at 28nm.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-13786 size-full\" src=\"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/bp_Security-with-Weebit-embedded-ReRAM-RRAM-IP-semiconductors-scaled.jpg\" alt=\"\" width=\"2560\" height=\"879\" srcset=\"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/bp_Security-with-Weebit-embedded-ReRAM-RRAM-IP-semiconductors-scaled.jpg 2560w, https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/bp_Security-with-Weebit-embedded-ReRAM-RRAM-IP-semiconductors-300x103.jpg 300w, https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/bp_Security-with-Weebit-embedded-ReRAM-RRAM-IP-semiconductors-1024x352.jpg 1024w, https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/bp_Security-with-Weebit-embedded-ReRAM-RRAM-IP-semiconductors-768x264.jpg 768w, https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/bp_Security-with-Weebit-embedded-ReRAM-RRAM-IP-semiconductors-1536x528.jpg 1536w, https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/bp_Security-with-Weebit-embedded-ReRAM-RRAM-IP-semiconductors-2048x703.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Above: TEM (transmission electron microscope) image of fabricated ReRAM array at 130nm: a) top view; b) cross section with ReRAM device highlighted<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>The arrays show high immunity to the high-temperature SMT (surface mount technology)-reflow process that is critical to electronic component manufacturing. The ReRAM PUF arrays also demonstrate resilience against modern Machine-Learning (ML) based side channel attacks (SCAs), a growing security threat for chips today. In addition, the fabricated arrays exhibit excellent performance in terms of speed, data retention and memory window.<\/p>\n<p>You can read the paper <a href=\"https:\/\/ieeexplore.ieee.org\/document\/10145993\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today we are surrounded by an ever-increasing array of connected devices. Electronic payments are becoming more popular, and we are keeping more and more personal information in the cloud. At the same time, risks continue to rise as hackers get better and better at breaking down security schemes. Regardless of the end application, security must [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":13787,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[1,62,65],"tags":[],"class_list":["post-13788","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-security","category-tech-research"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Setting a Foundationfor Security with ReRAM | Weebit | A Quantum Leap In Data Storage<\/title>\n<meta name=\"description\" content=\"Read Weebit Blog: Technology updates, industry trends, NVM embedded ReRAM (RRAM) IP developments replace Flash (eFlash) memory for secured CMOS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Setting a Foundationfor Security with ReRAM | Weebit | A Quantum Leap In Data Storage\" \/>\n<meta property=\"og:description\" content=\"Read Weebit Blog: Technology updates, industry trends, NVM embedded ReRAM (RRAM) IP developments replace Flash (eFlash) memory for secured CMOS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/\" \/>\n<meta property=\"og:site_name\" content=\"Weebit\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-15T13:08:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T11:16:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Amir Regev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amir Regev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/\"},\"author\":{\"name\":\"Amir Regev\",\"@id\":\"https:\/\/www.weebit-nano.com\/#\/schema\/person\/ef2355140af91a0575777db96165ec8a\"},\"headline\":\"Setting a Foundation for Security with ReRAM\",\"datePublished\":\"2023-06-15T13:08:09+00:00\",\"dateModified\":\"2025-06-25T11:16:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/\"},\"wordCount\":762,\"publisher\":{\"@id\":\"https:\/\/www.weebit-nano.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1.png\",\"articleSection\":[\"General\",\"Security\",\"Tech Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/\",\"url\":\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/\",\"name\":\"Setting a Foundation for Security with ReRAM | Weebit | A Quantum Leap In Data Storage\",\"isPartOf\":{\"@id\":\"https:\/\/www.weebit-nano.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1.png\",\"datePublished\":\"2023-06-15T13:08:09+00:00\",\"dateModified\":\"2025-06-25T11:16:15+00:00\",\"description\":\"Read Weebit Blog: Technology updates, industry trends, NVM embedded ReRAM (RRAM) IP developments replace Flash (eFlash) memory for secured CMOS\",\"breadcrumb\":{\"@id\":\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#primaryimage\",\"url\":\"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1.png\",\"contentUrl\":\"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1.png\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.weebit-nano.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Setting a Foundationfor Security with ReRAM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.weebit-nano.com\/#website\",\"url\":\"https:\/\/www.weebit-nano.com\/\",\"name\":\"Weebit\",\"description\":\"A Quantum Leap In Data Storage\",\"publisher\":{\"@id\":\"https:\/\/www.weebit-nano.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.weebit-nano.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.weebit-nano.com\/#organization\",\"name\":\"Weebit Nano\",\"url\":\"https:\/\/www.weebit-nano.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.weebit-nano.com\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Weebit Nano\"},\"image\":{\"@id\":\"https:\/\/www.weebit-nano.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.weebit-nano.com\/#\/schema\/person\/ef2355140af91a0575777db96165ec8a\",\"name\":\"Amir Regev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.weebit-nano.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2019\/04\/cropped-Amir-Regev-1-96x96.jpg\",\"contentUrl\":\"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2019\/04\/cropped-Amir-Regev-1-96x96.jpg\",\"caption\":\"Amir Regev\"},\"description\":\"VP Quality &amp; Reliability\",\"url\":\"https:\/\/www.weebit-nano.com\/author\/amir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Setting a Foundationfor Security with ReRAM | Weebit | A Quantum Leap In Data Storage","description":"Read Weebit Blog: Technology updates, industry trends, NVM embedded ReRAM (RRAM) IP developments replace Flash (eFlash) memory for secured CMOS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/","og_locale":"en_US","og_type":"article","og_title":"Setting a Foundationfor Security with ReRAM | Weebit | A Quantum Leap In Data Storage","og_description":"Read Weebit Blog: Technology updates, industry trends, NVM embedded ReRAM (RRAM) IP developments replace Flash (eFlash) memory for secured CMOS","og_url":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/","og_site_name":"Weebit","article_published_time":"2023-06-15T13:08:09+00:00","article_modified_time":"2025-06-25T11:16:15+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1-1024x683.png","type":"image\/png"}],"author":"Amir Regev","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amir Regev","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#article","isPartOf":{"@id":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/"},"author":{"name":"Amir Regev","@id":"https:\/\/www.weebit-nano.com\/#\/schema\/person\/ef2355140af91a0575777db96165ec8a"},"headline":"Setting a Foundation for Security with ReRAM","datePublished":"2023-06-15T13:08:09+00:00","dateModified":"2025-06-25T11:16:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/"},"wordCount":762,"publisher":{"@id":"https:\/\/www.weebit-nano.com\/#organization"},"image":{"@id":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#primaryimage"},"thumbnailUrl":"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1.png","articleSection":["General","Security","Tech Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/","url":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/","name":"Setting a Foundation for Security with ReRAM | Weebit | A Quantum Leap In Data Storage","isPartOf":{"@id":"https:\/\/www.weebit-nano.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#primaryimage"},"image":{"@id":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#primaryimage"},"thumbnailUrl":"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1.png","datePublished":"2023-06-15T13:08:09+00:00","dateModified":"2025-06-25T11:16:15+00:00","description":"Read Weebit Blog: Technology updates, industry trends, NVM embedded ReRAM (RRAM) IP developments replace Flash (eFlash) memory for secured CMOS","breadcrumb":{"@id":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#primaryimage","url":"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1.png","contentUrl":"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2023\/06\/PUF_Setting-a-Foundation-for-Security-with-ReRAM_1.png","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.weebit-nano.com\/setting-a-foundationfor-security-with-reram\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.weebit-nano.com\/"},{"@type":"ListItem","position":2,"name":"Setting a Foundationfor Security with ReRAM"}]},{"@type":"WebSite","@id":"https:\/\/www.weebit-nano.com\/#website","url":"https:\/\/www.weebit-nano.com\/","name":"Weebit","description":"A Quantum Leap In Data Storage","publisher":{"@id":"https:\/\/www.weebit-nano.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.weebit-nano.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.weebit-nano.com\/#organization","name":"Weebit Nano","url":"https:\/\/www.weebit-nano.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.weebit-nano.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Weebit Nano"},"image":{"@id":"https:\/\/www.weebit-nano.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.weebit-nano.com\/#\/schema\/person\/ef2355140af91a0575777db96165ec8a","name":"Amir Regev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.weebit-nano.com\/#\/schema\/person\/image\/","url":"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2019\/04\/cropped-Amir-Regev-1-96x96.jpg","contentUrl":"https:\/\/www.weebit-nano.com\/wp-content\/uploads\/2019\/04\/cropped-Amir-Regev-1-96x96.jpg","caption":"Amir Regev"},"description":"VP Quality &amp; Reliability","url":"https:\/\/www.weebit-nano.com\/author\/amir\/"}]}},"_links":{"self":[{"href":"https:\/\/www.weebit-nano.com\/wp-json\/wp\/v2\/posts\/13788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.weebit-nano.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.weebit-nano.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.weebit-nano.com\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.weebit-nano.com\/wp-json\/wp\/v2\/comments?post=13788"}],"version-history":[{"count":1,"href":"https:\/\/www.weebit-nano.com\/wp-json\/wp\/v2\/posts\/13788\/revisions"}],"predecessor-version":[{"id":16506,"href":"https:\/\/www.weebit-nano.com\/wp-json\/wp\/v2\/posts\/13788\/revisions\/16506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.weebit-nano.com\/wp-json\/wp\/v2\/media\/13787"}],"wp:attachment":[{"href":"https:\/\/www.weebit-nano.com\/wp-json\/wp\/v2\/media?parent=13788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.weebit-nano.com\/wp-json\/wp\/v2\/categories?post=13788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.weebit-nano.com\/wp-json\/wp\/v2\/tags?post=13788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}