2018
DOI: 10.1109/tcsii.2017.2749523
|View full text |Cite
|
Sign up to set email alerts
|

Hardware-Efficient Logic Camouflaging for Monolithic 3-D ICs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(16 citation statements)
references
References 14 publications
0
16
0
Order By: Relevance
“…6.4. Regarding prior art on 3D LC [22], [23], recall that they require a trusted FEOL facility; hence, their schemes are not directly comparable to ours. Also, at the time of writing, their libraries and protected designs were not available to us for a detailed study.…”
Section: Case Study On Cep and Jpegmentioning
confidence: 83%
See 1 more Smart Citation
“…6.4. Regarding prior art on 3D LC [22], [23], recall that they require a trusted FEOL facility; hence, their schemes are not directly comparable to ours. Also, at the time of writing, their libraries and protected designs were not available to us for a detailed study.…”
Section: Case Study On Cep and Jpegmentioning
confidence: 83%
“…6 for more comparative results. As for 3D integration, Yan et al [23] proposed LC for monolithic 3D ICs, and Gu et al [22] apply LC for 3D ICs, albeit using regular 2D LC schemes. Hence, while promising, both works still require trusted FEOL facilities.…”
Section: Layout Camouflagingmentioning
confidence: 99%
“…For example, the NAND-NOR-XOR primitive of [50] would incur 5.5× power, 1.6× delay, and 4× area cost compared to a regular NAND gate. 4 In contrast, the work in [184] report on average only 25% power cost, 15% delay cost, and 43% area savings compared to regular 2D gates.…”
Section: Confidentiality and Integrity Of Hardwarementioning
confidence: 99%
“…This idea serves for labelling and authentication of chips (or other goods, for that matter). Loosely related, because without [182] 2.5D IP protection; SM Interposer [82] 2.5D Trojan prevention; SM Interposer [183] F2F IP protection; SM, camouflaging Parts of 3D IC [184] M3D IP protection; camouflaging Whole 3D IC [185] F2F IP protection, Trojan prevention; Only BEOL SM, camouflaging [186] TSV Probing protection; enclosure Whole 3D IC [187,188] TSV Side-channel mitigation; enclosure Whole 3D IC [4] 2.5D Runtime monitoring; separation Interposer the need for nanowires, the authors in [93] proposed the concept of plasmonics-enhanced optical PUFs and provide physical-simulation results and a security analysis.…”
Section: Nanowires and Nwfetsmentioning
confidence: 99%
See 1 more Smart Citation