2018 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2018
DOI: 10.23919/date.2018.8341986
|View full text |Cite
|
Sign up to set email alerts
|

Advancing hardware security using polymorphic and stochastic spin-hall effect devices

Abstract: Protecting intellectual property (IP) in electronic circuits has become a serious challenge in recent years. Logic locking/encryption and layout camouflaging are two prominent techniques for IP protection. Most existing approaches, however, particularly those focused on CMOS integration, incur excessive design overheads resulting from their need for additional circuit structures or device-level modifications. This work leverages the innate polymorphism of an emerging spin-based device, called the giant spin-Ha… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2
1

Relationship

4
6

Authors

Journals

citations
Cited by 44 publications
(31 citation statements)
references
References 37 publications
0
31
0
Order By: Relevance
“…The gates' functionalities are not static anymore, possibly even for static input patterns, whereupon an attacker is bound to misinterpret some parts of the layout-it seems impossible to resolve all dynamic features on a full-chip scale at once. 1 Besides hindering read-out threats, polymorphism at the system level is also powerful to thwart SAT attacks. In fact, we provide such a concept based on the GSHE switch in Sec.…”
Section: ) Layout Identification and Read-out Attacksmentioning
confidence: 99%
“…The gates' functionalities are not static anymore, possibly even for static input patterns, whereupon an attacker is bound to misinterpret some parts of the layout-it seems impossible to resolve all dynamic features on a full-chip scale at once. 1 Besides hindering read-out threats, polymorphism at the system level is also powerful to thwart SAT attacks. In fact, we provide such a concept based on the GSHE switch in Sec.…”
Section: ) Layout Identification and Read-out Attacksmentioning
confidence: 99%
“…By tying the bits of an OTP or encryption pulse to the control bit of a CNOT gate, one can achieve controlled inversion of bits in the plaintext, depending on the encryption pulse. Spin devices like the ME-AFM transistor [42] are able to implement polymorphic logic gates, which can achieve inverting or non-inverting functionality based on a control signal [43]. Hence, the ME-AFM transistor can directly realize the CNOT gate.…”
Section: Data Con Dentiality Attacksmentioning
confidence: 99%
“…Also note that such approaches are conceptionally similar to design obfuscation leveraging traditional field-programmable gate arrays (FPGAs). In [162] and [161,163], polymorphic and obfuscated logic has been studied, based on domain-wall motion devices and on giant spin-Hall effect (GSHE) devices, respectively. One important benefit of the latter studies over the former is that they support all 16 possible functions per device; this renders these devices superior in terms of SAT resilience [161,163].…”
Section: Spintronicsmentioning
confidence: 99%