2017
DOI: 10.1007/s41635-017-0024-z
|View full text |Cite
|
Sign up to set email alerts
|

Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security

Abstract: In the last decade and so, a large amount of research has been done to secure hardware. Security features such as physically unclonable function (PUF), hardware metering, and obfuscation have been developed to protect hardware from threats. Detection and avoidance techniques for IC counterfeiting and hardware Trojan have been introduced to protect the IC supply chain. Till now, research has focused on digital ICs, but analog and mixed signal (AMS) ICs which hold the highest share in the market have been neglec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 67 publications
0
16
0
Order By: Relevance
“…It has analog and digital components, the radio-frequency integrated circuit (RF IC) belongs to the category of the AMS circuit. The combination of the trigger and the payload in the AMS circuit can be more diversified, which can be an analog trigger plus a digital payload or an analog trigger and an analog payload [ 47 ]. Oscillators, filters, bias generators, and opamps are the targets of HTs.…”
Section: Hardware Trojans On Special Chipsmentioning
confidence: 99%
See 1 more Smart Citation
“…It has analog and digital components, the radio-frequency integrated circuit (RF IC) belongs to the category of the AMS circuit. The combination of the trigger and the payload in the AMS circuit can be more diversified, which can be an analog trigger plus a digital payload or an analog trigger and an analog payload [ 47 ]. Oscillators, filters, bias generators, and opamps are the targets of HTs.…”
Section: Hardware Trojans On Special Chipsmentioning
confidence: 99%
“…What is more, the HT detection methods were emphasized, and the prevention technologies have not been discussed in a framework. Alam et al [ 47 ] included the HTs for the analog circuit in the review, and compared to the digital circuit HT, it further expanded the discussion of HT in the IC category. If this paper can increase the HT research discussion about emerging chips, the review will be more complete.…”
Section: Introductionmentioning
confidence: 99%
“…Several methods have been described in the literature to detect and prevent counterfeit electronics. These methods can be broadly divided into three major categories: (1) Hardware security primitives: This is mostly applicable to new chip designs, where additional security primitives are designed along with existing chip architecture to detect cloned or recycled counterfeits. For cloned counterfeit detection, silicon fingerprints called physical unclonable functions (PUFs) are developed [15].…”
Section: Introductionmentioning
confidence: 99%
“…While extensive research efforts have been expended over the last decade in understanding trust and security threat scenarios in digital ICs and developing solutions [1]- [5], the topic remains largely unexplored for analog ICs and there is an alarming lack of understanding of the solution space [6]- [8]. Analog ICs are perhaps the weakest link in warranting the global security policy for the entire electronic system.…”
Section: Introductionmentioning
confidence: 99%