2009 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition 2009
DOI: 10.1109/date.2009.5090709
|View full text |Cite
|
Sign up to set email alerts
|

Hardware aging-based software metering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 6 publications
0
12
0
Order By: Relevance
“…Gate level characterization (GLC) under the impact of process variation has been assumed as a key step in many hardware security applications [10] [20]. The basic approaches which have been proposed [3][11] [19] characterize the manifestational properties of each gate by measuring the overall properties of the entire IC.…”
Section: Related Workmentioning
confidence: 99%
“…Gate level characterization (GLC) under the impact of process variation has been assumed as a key step in many hardware security applications [10] [20]. The basic approaches which have been proposed [3][11] [19] characterize the manifestational properties of each gate by measuring the overall properties of the entire IC.…”
Section: Related Workmentioning
confidence: 99%
“…A main ramification of NBTI is a significant speed degradation of the pertinent gates ( [1], [6] ). Employment of device aging has been proposed for software metering ( [7]), hardware-based cryptography ( [8]), and prevention of reverse engineering ( [2]). …”
Section: Related Workmentioning
confidence: 99%
“…Passive metering techniques have low cost overhead but they do not provide enforcement mechanisms ( [21]). Dabiri et al proposed the addition of a high area and energy specialty circuitry for the remote chip enabling and disabling and the software usage metering ( [7]). …”
Section: Related Workmentioning
confidence: 99%
“…Our techniques make no assumptions about the correlation of manufacturing variability across gates, and thus our approach is more robust and realistic. [17] uses convex programming to determine gate level characteristics. Its applicability is limited to butterfly networks, where a path exists from each input to each output.…”
Section: Related Workmentioning
confidence: 99%