2022
DOI: 10.1109/tcad.2021.3111550
|View full text |Cite
|
Sign up to set email alerts
|

Digitally Assisted Mixed-Signal Circuit Security

Abstract: The design and manufacturing steps of a chip typically involve several parties. For example, a chip may comprise several third-party Intellectual Property (IP) cores and the Integrated Circuit (IC) fabrication may be outsourced to a third-party foundry. IP cores and ICs are shared with potentially untrusted third parties and, as a result, are subject to piracy attacks. Even more, any legally purchased chip may be reverse-engineered to retrieve the design down to transistorlevel and, thereby, it is also subject… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…For a recent review of logic locking techniques and counter-attacks the reader is referred to [3]. Leveraging logic locking to lock a mixedsignal design via locking its digital section was proposed in [15]- [17]. In [15], locking targeted the digital processor in the feedback calibration loop, while in [16], [17] locking targeted digital blocks within the signal processing chain.…”
Section: Prior Art On Locking and Anti-piracy Designmentioning
confidence: 99%
See 1 more Smart Citation
“…For a recent review of logic locking techniques and counter-attacks the reader is referred to [3]. Leveraging logic locking to lock a mixedsignal design via locking its digital section was proposed in [15]- [17]. In [15], locking targeted the digital processor in the feedback calibration loop, while in [16], [17] locking targeted digital blocks within the signal processing chain.…”
Section: Prior Art On Locking and Anti-piracy Designmentioning
confidence: 99%
“…Leveraging logic locking to lock a mixedsignal design via locking its digital section was proposed in [15]- [17]. In [15], locking targeted the digital processor in the feedback calibration loop, while in [16], [17] locking targeted digital blocks within the signal processing chain. This latter locking approach, called MixLock, was demonstrated recently for RF transceivers [18].…”
Section: Prior Art On Locking and Anti-piracy Designmentioning
confidence: 99%
“…If the attack is staged by the foundry, pre-silicon prevention methods include: (a) filling in all unused spaces on the layout, which are most likely insertion areas for the HT, with functional filler cells and checking if those have changed [53]; and (b) design obfuscation, for example using locking [54], [55], [56], [57], [58], [59], [60], camouflaging [61], [62], [63], or split manufacturing [64], [65], aiming at obscuring the circuit functionality so as to make it difficult for the attacker to insert the HT.…”
Section: Related Prevention and Detection De-fense Mechanismsmentioning
confidence: 99%
“…Alternatively, since the amplitude of the desired signal is much more meaningful than its initial phase part, the absolute design has been introduced [19]. Given that hybrid circuits leverage the strengths of digital circuits, which excel at handling discrete values and performing complex logic operations, with the advantages of analog circuits, which are highly efficient at processing continuous signals and interfacing with the real world [20][21][22], this technique illustrates a promising future among sensing, electromagnetic measuring, and weak optical signal detecting.…”
Section: Introductionmentioning
confidence: 99%