2021
DOI: 10.1109/tcsii.2020.3040725
|View full text |Cite
|
Sign up to set email alerts
|

Analog/RF IP Protection: Attack Models, Defense Techniques, and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 38 publications
0
6
0
Order By: Relevance
“…However, migration to higher frequency bands complicates efforts to reduce the power consumption in wireless data links used for many consumer and medical applications. In addition to low power consumption, maintaining a high level of security and trust is critical in such links to protect sensitive data and preserve user privacy [2,3]. This requirement further complicates the design of low-power high-data throughput wireless transceivers operating at mm-Wave frequency bands.…”
Section: Introductionmentioning
confidence: 99%
“…However, migration to higher frequency bands complicates efforts to reduce the power consumption in wireless data links used for many consumer and medical applications. In addition to low power consumption, maintaining a high level of security and trust is critical in such links to protect sensitive data and preserve user privacy [2,3]. This requirement further complicates the design of low-power high-data throughput wireless transceivers operating at mm-Wave frequency bands.…”
Section: Introductionmentioning
confidence: 99%
“…In the last decade, extensive research has been carried out to understand trust and security threat scenarios in digital ICs. Analog and mixed-signal (A/M-S) ICs on the other hand have so far received far less attention and as a consequence the number of proposed solutions is low [3]. This work proposes MixLock, a method of hardware security for M-S ICs based on locking with the goal to prevent IP/IC piracy.…”
Section: Introductionmentioning
confidence: 99%
“…Efforts have concentrated primarily on digital designs with countermeasures such as locking [3], split manufacturing [4], and camouflaging [5]. For analog and mixed-signal (AMS) designs the first defenses have appeared only recently [6]- [8]. Similar countermeasure principles are adapted for AMS designs, including locking [9]- [17], split manufacturing [18], and camouflaging [19], [20].…”
Section: Introductionmentioning
confidence: 99%