2015
DOI: 10.3390/electronics4030541
|View full text |Cite
|
Sign up to set email alerts
|

Beyond the Interconnections: Split Manufacturing in RF Designs

Abstract: With the globalization of the integrated circuit (IC) design flow of chip fabrication, intellectual property (IP) piracy is becoming the main security threat. While most of the protection methods are dedicated for digital circuits, we are trying to protect radio-frequency (RF) designs. For the first time, we applied the split manufacturing method in RF circuit protection. Three different implementation cases are introduced for security and design overhead tradeoffs, i.e., the removal of the top metal layer, th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(17 citation statements)
references
References 14 publications
(23 reference statements)
0
17
0
Order By: Relevance
“…5, where we plot PPA over- heads for naive lifting of randomly selected nets. 4 Note that the die area is particularly impacted. That is because lifting more and more wires in an uncontrolled manner induces notable routing congestion which, in order to obtain DRC-clean layouts, can only be managed by enlarging the die outlines.…”
Section: Normalized Count Of Oppsmentioning
confidence: 99%
See 1 more Smart Citation
“…5, where we plot PPA over- heads for naive lifting of randomly selected nets. 4 Note that the die area is particularly impacted. That is because lifting more and more wires in an uncontrolled manner induces notable routing congestion which, in order to obtain DRC-clean layouts, can only be managed by enlarging the die outlines.…”
Section: Normalized Count Of Oppsmentioning
confidence: 99%
“…Hill et al [2] successfully demonstrated the viability of SM by fabricating a 1.3 milliontransistor asynchronous FPGA. Further studies also bear testament to the applicability of SM [3,4,5]. However, the overall acceptance of SM remains behind expectations so far, mainly due to concerns about cost.…”
Section: Introductionmentioning
confidence: 97%
“…It is also a key issue in hardware sensors and chips and in hardware trust [14]. Robustness is essential for embedded systems security where hardware attacks such as fault injection attacks and hardware Trojans can be prevented if robustness were taken as a main factor in embedded systems design [15,16].…”
Section: Robustness Techniquesmentioning
confidence: 99%
“…It gives reasons for low-power very-large scale integration (VLSI) design industries and researchers to develop low-power, low-noise, and reliable UWB radio-frequency integrated circuits (RFICs) for these applications. Moreover, continuous shrinking in complementary metal oxide semiconductor (CMOS) chip fabrication technologies and split manufacturing techniques in RF designs [6,7], makes it possible to design and fabricate RFICs on the nanometer scale [8,9].…”
Section: Introductionmentioning
confidence: 99%