2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) 2014
DOI: 10.1109/hst.2014.6855559
|View full text |Cite
|
Sign up to set email alerts
|

Building trusted ICs using split fabrication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 88 publications
(42 citation statements)
references
References 4 publications
0
40
0
Order By: Relevance
“…are used for detection [13][14][15][16][17][18][19] [26], increasing side-channel activity caused by Trojans [27] and run-time monitoring [28] have been proposed. On the other hand, in order to make Trojan insertion difficult, researchers have proposed techniques such as logic obfuscation to lock the functionality of the IC [29][30][31], functional filler cell insertion [32] for layout protection, IC camouflaging [33] and split-manufacturing [34,35] to prevent reverse-engineering of the design. These design-for-trust techniques can potentially help to detect and prevent highly stealthy Trojans that can otherwise evade pre and post-silicon detection techniques, albeit at the cost of area, power and timing overhead.…”
Section: Detection Techniquesmentioning
confidence: 99%
“…are used for detection [13][14][15][16][17][18][19] [26], increasing side-channel activity caused by Trojans [27] and run-time monitoring [28] have been proposed. On the other hand, in order to make Trojan insertion difficult, researchers have proposed techniques such as logic obfuscation to lock the functionality of the IC [29][30][31], functional filler cell insertion [32] for layout protection, IC camouflaging [33] and split-manufacturing [34,35] to prevent reverse-engineering of the design. These design-for-trust techniques can potentially help to detect and prevent highly stealthy Trojans that can otherwise evade pre and post-silicon detection techniques, albeit at the cost of area, power and timing overhead.…”
Section: Detection Techniquesmentioning
confidence: 99%
“…Design for trust is mainly associated with creating IC designs with runtime monitoring [58], supportive test points, sensors, and obfuscation [59], within the design which facilitates Trojan detection or prevents Trojan insertion accordingly. Split manufacturing is another technique which aims at building a trusted flow of fabrication process by dividing it into two parts [60], [61]: front end of the line (FEOL) and back end of the line (BEOL) fabrication. An untrusted foundry performing FEOL does not have access to the layers in BEOL and is unable to find the proper part of the IC to insert the Trojan.…”
Section: Digital Hardware Trojansmentioning
confidence: 99%
“…A comparison is given in Table IX. 1. Split-Manufacturing: A split at the first metal layer (or very low metal layers) can prevent an untrusted foundry from reverse-engineering a design since most interconnects are missing [46][47]. However, split manufacturing does not provide Trojan detection by itself.…”
Section: B Tpad Vs Other Techniquesmentioning
confidence: 99%