2014
DOI: 10.1049/iet-cdt.2014.0028
|View full text |Cite
|
Sign up to set email alerts
|

Survey of hardware protection of design data for integrated circuits and intellectual properties

Abstract: This paper reviews the current situation regarding design protection in the microelectronics industry. Over the past ten years, the designers of integrated circuits and intellectual properties have faced increasing threats including counterfeiting, reverse-engineering and theft. This is now a critical issue for the microelectronics industry, mainly for fabless designers and intellectual properties designers. Coupled with increasing pressure to decrease the cost and increase the performance of integrated circui… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 67 publications
(16 citation statements)
references
References 78 publications
0
16
0
Order By: Relevance
“…Figure 2 presents a dedicated threat model focused on an IP life cycle. Many dedicated threats target the IP life cycle and result to revenues losses for the IP designers [1], [2]. The IP threat model includes illegal re-use, illegal sales, cloning (illegal copy) of the IP.…”
Section: The Threat Model Of Ic and Ipmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 2 presents a dedicated threat model focused on an IP life cycle. Many dedicated threats target the IP life cycle and result to revenues losses for the IP designers [1], [2]. The IP threat model includes illegal re-use, illegal sales, cloning (illegal copy) of the IP.…”
Section: The Threat Model Of Ic and Ipmentioning
confidence: 99%
“…In addition, the time-to-market is increasingly tight. This has made expensive devices the target of counterfeiting, cloning, illegal copy, theft and malicious hardware insertion (such as hardware Trojans) [1], [2].…”
Section: Introductionmentioning
confidence: 99%
“…In the classic supply chain management this threat existed already at the level of the top floor (ERP systems were already linked for example by EDI). [11], [3]) systematizes the knowledge in hardware security and design protection in the microelectronics industry, including a classification of threat models (hardware Trojans, IP piracy and IC overbuilding, reverse engineering, side channel analysis and counterfeiting), state-of-the-art defenses (design obfuscation, IP watermarking, IP fingerprinting, IC metering, split manufacturing IC camouflaging, IC information leakage reduction, key based authentication, noise injection secure-scan, physical unclonable functions PUF / unique IDs and aging sensors), and evaluation metrics for important hardware-based attacks. Using the network all connected systems at these two levels can be accessed and attacked.…”
Section: New Challenges and Threatsmentioning
confidence: 99%
“…Nevertheless the IP business suffers from a lack a security due to the intrinsic form of IPs sales and exchanges. Many dedicated threats target the IP life cycle and result to revenues losses for the IP designers [1]. The IP threat model includes illegal re-use, illegal sales, cloning (illegal copy) of the IP.…”
Section: Introductionmentioning
confidence: 99%
“…Up to now, these three characteristics are not available in the state-of-the-art. To meet these requirements, in this letter we propose an ultra-lightweight binary frequency shift keying (BFSK) transmitter to forward IP identity (that could be generated for example by a feedback shift-register or a physical unclonable function [1]) discreetly using an electromagnetic channel. Such circuit is usually called "spy circuitry".…”
Section: Introductionmentioning
confidence: 99%