2012
DOI: 10.1109/tifs.2011.2181500
|View full text |Cite
|
Sign up to set email alerts
|

Gate Characterization Using Singular Value Decomposition: Foundations and Applications

Abstract: Abstract-Modern hardware security has a very broad scope ranging from digital rights management to the detection of ghost circuitry. These and many other security tasks are greatly hindered by process variation, which makes each integrated circuit (IC) unique, and device aging, which evolves the IC throughout its lifetime. We have developed a singular value decomposition (SVD)-based procedure for gate-level characterization (GLC) that calculates changes in properties, such as delay and switching power of each … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
6
3
1

Relationship

4
6

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 40 publications
0
7
0
Order By: Relevance
“…Trusted monitor chips stacked on top of an untrusted chip using through-silicon vias (TSVs) may be used to actively detect attacks [49] or selected wires may be lifted (using TSVs) to a secure layer to obfuscate a design [106]. Large TSV pitch can lead to area inefficiencies [50] [84] are estimated, and Trojans are identified. GLC shares the limitations of other fingerprinting techniques (e.g., [89] VIII.…”
Section: B Tpad Vs Other Techniquesmentioning
confidence: 99%
“…Trusted monitor chips stacked on top of an untrusted chip using through-silicon vias (TSVs) may be used to actively detect attacks [49] or selected wires may be lifted (using TSVs) to a secure layer to obfuscate a design [106]. Large TSV pitch can lead to area inefficiencies [50] [84] are estimated, and Trojans are identified. GLC shares the limitations of other fingerprinting techniques (e.g., [89] VIII.…”
Section: B Tpad Vs Other Techniquesmentioning
confidence: 99%
“…In [1,7,8] the authors used a coordinate Figure 2: Taxonomie based on [17] system transformation by the principal components in order to identify altered circuit designs based on simulations. Another proposed method to identify a Trojan signature in a noisy measurement distribution is to use singular value decomposition [24]. Both methods were evaluated under the assumption of a golden chip scenario and the circuits were simulated based on a circuit-design simulator, for instance SPICE.…”
Section: Trojan Detectionmentioning
confidence: 99%
“…The key idea is that each SRAM cell has a high probability that it is initialized to some value, either 0 or 1, after each power-up. Although the "stability " of the SRAM PUF cells has always been a problem, recently, it has been experimentally demonstrated that the use of device aging [20][21] [22], specifically hot carrier injection (HCI) [23] [24], can completely eliminate this problem.…”
Section: A Pufmentioning
confidence: 99%