2020
DOI: 10.1109/access.2020.3029339
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Split Manufacturing: Attacks, Defenses, and Challenges

Abstract: In today's integrated circuit (IC) ecosystem, owning a foundry is not economically viable, and therefore most IC design houses are now working under a fabless business model. In order to overcome security concerns associated with the outsorcing of IC fabrication, the Split Manufacturing technique was proposed. In Split Manufacturing, the Front End of Line (FEOL) layers (transistors and lower metal layers) are fabricated at an untrusted high-end foundry, while the Back End of Line (BEOL) layers (higher metal la… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(25 citation statements)
references
References 45 publications
0
25
0
Order By: Relevance
“…The orange curves in Figs. [16][17][18][19] show the HT-infected performances in this scenario. As it can be seen, all performances are degraded.…”
Section: B Ht Payload Designmentioning
confidence: 66%
See 2 more Smart Citations
“…The orange curves in Figs. [16][17][18][19] show the HT-infected performances in this scenario. As it can be seen, all performances are degraded.…”
Section: B Ht Payload Designmentioning
confidence: 66%
“…The red curves in Figs. [16][17][18][19] show the HT-infected performances in this scenario. As it can be seen, there is no noise shaping and the signal now is buried under the noise floor.…”
Section: B Ht Payload Designmentioning
confidence: 66%
See 1 more Smart Citation
“…Furthermore, we argue that our proposed methodology is not only capable of inserting an SCT in a high density layout, but also of keeping the target's performance regardless of its (challenging) frequency. Finally, there are very few techniques that would assuredly counter the ECO-enabled trojan insertion [3], [25].…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…Countermeasures against IP/IC piracy have been extensively studied for digital ICs for over a decade now. Main countermeasures include split manufacturing [5], [6], physical design obfuscation [7], [8], and logic locking [9], [10].…”
Section: Introductionmentioning
confidence: 99%