2021
DOI: 10.1109/tvlsi.2021.3117584
|View full text |Cite
|
Sign up to set email alerts
|

Locking by Untuning: A Lock-Less Approach for Analog and Mixed-Signal IC Security

Abstract: We propose an anti-piracy security approach for programmable analog and mixed-signal (AMS) Integrated Circuits (ICs). The security approach relies on functionality locking by leveraging the inherent programmability and utilizing the configuration settings as secret keys or, equivalently, the programming bits as key-bits. When invalid keys are applied, the circuit is untuned and, as a result, its functionality breaks, i.e., at least one of the performances violates its specification. As long as the calibration … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 61 publications
0
2
0
Order By: Relevance
“…If the attack is staged by the foundry, pre-silicon prevention methods include: (a) filling in all unused spaces on the layout, which are most likely insertion areas for the HT, with functional filler cells and checking if those have changed [53]; and (b) design obfuscation, for example using locking [54], [55], [56], [57], [58], [59], [60], camouflaging [61], [62], [63], or split manufacturing [64], [65], aiming at obscuring the circuit functionality so as to make it difficult for the attacker to insert the HT.…”
Section: Related Prevention and Detection De-fense Mechanismsmentioning
confidence: 99%
“…If the attack is staged by the foundry, pre-silicon prevention methods include: (a) filling in all unused spaces on the layout, which are most likely insertion areas for the HT, with functional filler cells and checking if those have changed [53]; and (b) design obfuscation, for example using locking [54], [55], [56], [57], [58], [59], [60], camouflaging [61], [62], [63], or split manufacturing [64], [65], aiming at obscuring the circuit functionality so as to make it difficult for the attacker to insert the HT.…”
Section: Related Prevention and Detection De-fense Mechanismsmentioning
confidence: 99%
“…For example, SSCF is a generic countermeasure that has shown to be very effective for AMS ICs since several parametric measurements can be defined on AMS ICs on which a HT inevitably leaves traces [45]. Design obfuscation techniques have also been recently proposed for AMS ICs, including locking [80]- [84] and camouflaging [85], [86]. IFT is adapted for AMS ICs in [87].…”
Section: Ht Countermeasuresmentioning
confidence: 99%