2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) 2014
DOI: 10.1109/hst.2014.6855561
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and secure intellectual property (IP) design with split fabrication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 59 publications
(32 citation statements)
references
References 6 publications
0
32
0
Order By: Relevance
“…Therefore, only the information at the gate level of the circuit will be revealed to the untrusted companies. A similar method was achieved in detail for analog and digital IC circuits in [109]. The technique against recognition IC-based attacks has also been included, supported by experimental results, where an SRAM with a 1 KB size and a digital-to-analog converter with 14 bits have been used.…”
Section: Split Manufacturingmentioning
confidence: 79%
“…Therefore, only the information at the gate level of the circuit will be revealed to the untrusted companies. A similar method was achieved in detail for analog and digital IC circuits in [109]. The technique against recognition IC-based attacks has also been included, supported by experimental results, where an SRAM with a 1 KB size and a digital-to-analog converter with 14 bits have been used.…”
Section: Split Manufacturingmentioning
confidence: 79%
“…With the capability of countering random mismatch with minimum analog circuits overhead involved, the SES method has been considered as a suitable analog circuit design methodology in sub-20 nm CMOS technology nodes [14]. The application of the SES method further extends to the area of trusted IC manufacturing using split fabrication, where analog circuit design intention can be obfuscated by redundant analog circuit components and associated digital control circuits [15].…”
Section: Extended Statistical Element Selection (Eses)mentioning
confidence: 99%
“…Furthermore, the recognition attack mechanism used in [12] cannot accurately explain the issue with RF split fabrication. To better guide the implementation of split manufacturing in RF circuits and to balance between the security level and design efforts, we propose three approaches/scenarios to perform the RF split fabrication:…”
Section: Split Manufacturing In Rf Circuitsmentioning
confidence: 99%
“…More recently, Vaidyanathan et al investigated the feasibility of split fabrication after the metal1 layer, so that untrusted foundries only have the information of basic gate-level blocks [11]. A similar technique is then applied to digital/analog IP designs [12]. A defense strategy against recognition attacks on IPs and an obfuscation method were both proposed, as well as experimental demonstrations on a 1-KB SRAM and a 14-bit current steering digital-to-analog converter (DAC).Jagasivamani et al examined several front-end obfuscation techniques, information theory metrics and impacts on performance penalties [13].…”
Section: Split Manufacturing In the Digital Domainmentioning
confidence: 99%
See 1 more Smart Citation