2018
DOI: 10.1109/tvlsi.2017.2787754
|View full text |Cite
|
Sign up to set email alerts
|

The Cat and Mouse in Split Manufacturing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
92
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(96 citation statements)
references
References 22 publications
4
92
0
Order By: Relevance
“…Since physical layouts are designed holistically, at least when using regular and security-unaware CAD tools, various hints on the BEOL can remain within the FEOL. Wang et al [35] proposed a so-called proximity attack, where they formulated various FEOL-level hints within a network-flow attack model. 2 For selected designs, they succeeded to infer the majority of missing BEOL wires.…”
Section: A Split Manufacturingmentioning
confidence: 99%
See 3 more Smart Citations
“…Since physical layouts are designed holistically, at least when using regular and security-unaware CAD tools, various hints on the BEOL can remain within the FEOL. Wang et al [35] proposed a so-called proximity attack, where they formulated various FEOL-level hints within a network-flow attack model. 2 For selected designs, they succeeded to infer the majority of missing BEOL wires.…”
Section: A Split Manufacturingmentioning
confidence: 99%
“…For the scenario of malicious fab employees, we evaluate our scheme against the powerful open-source proximity attacks [33], [35] and [34], [36] in Sec. VI-D. We conduct experiments for layouts being split after M3 and M4, respectively, which helps us to evaluate the significance of the split layer for our scheme.…”
Section: A Setupmentioning
confidence: 99%
See 2 more Smart Citations
“…In contrast, we assume that the physical hardware is trusted; hardware trojans [217] are thus out of scope. As hardware trojans are a fertile area of research in the hardware security community [34,68,94,115,189,229,231,252], this assumption is reasonable when considering samples of software instead of circuit design or layout.…”
Section: Threat Modelmentioning
confidence: 99%