Network-on-Chip Security and Privacy 2021
DOI: 10.1007/978-3-030-69131-8_1
|View full text |Cite
|
Sign up to set email alerts
|

Trustworthy System-on-Chip Design Using Secure on-Chip Communication Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 79 publications
0
1
0
Order By: Relevance
“…• Fabrication Stage: After all the design checks, the layout file is shared with the manufacturer to fabricate the IC by assembling all the components. Various threats can be introduced when manufacturing in an untrusted facility, including Trojans, reverse engineering, and IP privacy violations [15]. Furthermore, altering the chemical concentrations during the fabrication can lead to changes in electrical or electromagnetic properties, which may, in turn, impact the performance and lifetime of an integrated circuit.…”
Section: Preliminariesmentioning
confidence: 99%
“…• Fabrication Stage: After all the design checks, the layout file is shared with the manufacturer to fabricate the IC by assembling all the components. Various threats can be introduced when manufacturing in an untrusted facility, including Trojans, reverse engineering, and IP privacy violations [15]. Furthermore, altering the chemical concentrations during the fabrication can lead to changes in electrical or electromagnetic properties, which may, in turn, impact the performance and lifetime of an integrated circuit.…”
Section: Preliminariesmentioning
confidence: 99%