2018
DOI: 10.1007/s41635-018-0055-0
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 36 publications
(13 citation statements)
references
References 29 publications
0
13
0
Order By: Relevance
“…LASRE is another technique that relies on using frequencybased texture signatures for different materials to segment out IC structure across multiple layers [63]. Simple image processing techniques, such as Otsu's binarization, have also been explored for segmenting SEM images [80]- [84].…”
Section: A Data-driven Approaches In Rementioning
confidence: 99%
See 1 more Smart Citation
“…LASRE is another technique that relies on using frequencybased texture signatures for different materials to segment out IC structure across multiple layers [63]. Simple image processing techniques, such as Otsu's binarization, have also been explored for segmenting SEM images [80]- [84].…”
Section: A Data-driven Approaches In Rementioning
confidence: 99%
“…Being in the middle of the RE workflow, the amount of errors accumulated at this stage is far lower than further down the line. Several approaches use segmented images of the IC layers for detecting hardware Trojans [6], [84], [89]- [93]. Being segmented, hardware assurance measures performed at this stage can also be free of the influence of localized variation in pixel intensity and noise.…”
Section: Vectorizationmentioning
confidence: 99%
“…A SEM-based acquisition technique, named SEMBA, for white team HTs detection is proposed [14], which is based on the wet etching, scanning electron microscopy and multiple image alignment. A computer vision-based framework for the HT detection on golden IC and IUA images is designed [15]. A HTs detection method named Golden Gates is designed to achieve a comparable level of accuracy to reverse engineering only with less time cost [16].…”
Section: Introductionmentioning
confidence: 99%
“…This information can then be used to dynamically change the imaging parameters, as necessary, for different regions of the sample rather than using a constant setting for the entire sample. Since low quality imaging takes significantly less time than high quality imaging [3], the time required to image a sample would only be constrained only by the high frequency regions present in the sample. We were able to reduce the imaging time by 20% for the 130nm node technology IC shown in Fig.…”
mentioning
confidence: 99%
“…However, RE requires long hours of imaging for an IC even if it is done automatically. In [3], the estimated time to image an IC of size 1.5mm x 1.5mm employing a 130nm node technology with high resolution went up to 30 days. With the ongoing trend of adding more structures onto a limited space on the IC, the imaging time frame is becoming unfeasible.…”
mentioning
confidence: 99%