Micron Technology, Inc.
UNAUTHORIZED MEMORY ACCESS MITIGATION
Last updated:
Abstract:
Apparatuses and methods related to mitigating unauthorized memory access are described. Mitigating unauthorized memory access can include verifying whether an access command is authorized to access a protected region of a memory array. The authorization can be verified utilizing a key and a memory address corresponding to the access command. If an access command is authorized to access a protected region, then a row of the memory array corresponding to the access command can be activated. If an access command is not authorized to access the protected region, then a row of the memory array corresponding to the access command may not be activated.
Status:
Application
Type:
Utility
Filling date:
4 Feb 2022
Issue date:
19 May 2022