2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2014
DOI: 10.1109/iccad.2014.7001361
|View full text |Cite
|
Sign up to set email alerts
|

Protecting integrated circuits from piracy with test-aware logic locking

Abstract: The increasing IC manufacturing cost encourages a business model where design houses outsource IC fabrication to remote foundries. Despite cost savings, this model exposes design houses to IC piracy as remote foundries can manufacture in excess to sell on the black market. Recent efforts in digital hardware security aim to thwart piracy by using XOR-based chip locking, cryptography, and active metering. To counter direct attacks and lower the exposure of unlocked circuits to the foundry, we introduce a multipl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…They are classified into anti-reverse engineering [10], [15], vulnerability analysis [13], HT detection [2], [4]- [6], [8], [11], [14], [16], [19], [21]. test point insertion [18], logic obfuscation [9], [12], HT prevention [20], and HT removing [7]. Anti-reverse engineering implements special gates on original designs against reverse engineering.…”
Section: A Previous Workmentioning
confidence: 99%
“…They are classified into anti-reverse engineering [10], [15], vulnerability analysis [13], HT detection [2], [4]- [6], [8], [11], [14], [16], [19], [21]. test point insertion [18], logic obfuscation [9], [12], HT prevention [20], and HT removing [7]. Anti-reverse engineering implements special gates on original designs against reverse engineering.…”
Section: A Previous Workmentioning
confidence: 99%
“…Considering the threat model described above, a major concern expressed in [20] is the ease of a hill-climbing attack. It was described as an attack against the logic masking technique presented in [3].…”
Section: Hill-climbing Attackmentioning
confidence: 99%
“…This is due to the tight link between the masking/locking inputs and the outputs. The attack procedure for logic masking described in [20] is as follows. First, pick a random key and apply it on the unlocking inputs.…”
Section: Hill-climbing Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Intellectual property protection means were proposed to thwart this threat [2] and some are based on RTL modifications [3]. We add our voice to authors of [4] to explicitly define the terms used for gate level modifications of netlists to achieve intellectual property protection. We use the terminology recently defined in [3], and focus on logic masking.…”
Section: Introductionmentioning
confidence: 99%