2010
DOI: 10.1109/mc.2010.284
|View full text |Cite
|
Sign up to set email alerts
|

Ending Piracy of Integrated Circuits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
180
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 305 publications
(180 citation statements)
references
References 6 publications
0
180
0
Order By: Relevance
“…We expect this trend to further intensify for the complex and diverse 3D integration landscape, thereby increasing the risk exposure for 3D chips. To address and manage this challenge of verification and other security-centric challenges, the notions of "secure by design" and "design-for-trust" have been promoted for some years now for "regular" 2D chips [116], [117], [118], [119], [123], [124], [125], [126], [127], [128]. Similar studies are recently focusing on 3D chips as well [129], [130], [131], [132], [133], [134], [135], [136], [137], [138].…”
Section: Towards Trustworthy 3d Integrationmentioning
confidence: 99%
“…We expect this trend to further intensify for the complex and diverse 3D integration landscape, thereby increasing the risk exposure for 3D chips. To address and manage this challenge of verification and other security-centric challenges, the notions of "secure by design" and "design-for-trust" have been promoted for some years now for "regular" 2D chips [116], [117], [118], [119], [123], [124], [125], [126], [127], [128]. Similar studies are recently focusing on 3D chips as well [129], [130], [131], [132], [133], [134], [135], [136], [137], [138].…”
Section: Towards Trustworthy 3d Integrationmentioning
confidence: 99%
“…In [19][20][21], the authors presented a technique to insert XOR/XNOR gates randomly into an original circuit to conceal its functionality. Upon inserting the valid key, the end-user can get the correct output.…”
Section: Prior Workmentioning
confidence: 99%
“…sated by error correction). State-of-the-art hardware metering approaches [16] combine unclonable identifiers with locking/unlocking functionality: the circuit is nonfunctional upon fabrication and must receive a unique unlocking sequence in order to start working. This sequence is calculated by the designer from the unclonable identifier data provided by the manufacturer, but cannot be calculated by the manufacturer alone.…”
Section: Counterfeiting and Hardware Meteringmentioning
confidence: 99%
“…The unlocking circuitry present in every circuit incorporates the designer's public key, and the circuit becomes functional only if the unlocking sequence has been created based on the designer's private key. Practical protocols are more complex in order to eliminate several further vulnerabilities [16].…”
Section: Counterfeiting and Hardware Meteringmentioning
confidence: 99%