Proceedings of the 53rd Annual Design Automation Conference 2016
DOI: 10.1145/2897937.2898104
|View full text |Cite
|
Sign up to set email alerts
|

The cat and mouse in split manufacturing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

5
123
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(128 citation statements)
references
References 15 publications
5
123
0
Order By: Relevance
“…Compared with the state-ofthe-art network-flow attack [1], the correct connection rate is improved by 1.21× and 1.12× when splitting on Metal 1 and Metal 3, respectively. Moreover, the runtime for our attack is significantly less, namely less than 1% of that of [1]. As a part of future work, we plan to extend our neural network to tackle industrial layouts which have been incorporated with various placement-based and/or routing-based defense strategies.…”
Section: Resultsmentioning
confidence: 94%
“…Compared with the state-ofthe-art network-flow attack [1], the correct connection rate is improved by 1.21× and 1.12× when splitting on Metal 1 and Metal 3, respectively. Moreover, the runtime for our attack is significantly less, namely less than 1% of that of [1]. As a part of future work, we plan to extend our neural network to tackle industrial layouts which have been incorporated with various placement-based and/or routing-based defense strategies.…”
Section: Resultsmentioning
confidence: 94%
“…A network-flow based attack model towards flattened designs was proposed by Wang et. al [20]. The authors argued that the proximity attack originally proposed by [10] utilizes hints that can be used only by hierarchical designs, and that modern designs are often flattened 3 .…”
Section: Attacks On Split Manufacturingmentioning
confidence: 99%
“…The EMSR metric is an attempt to quantify the ratio of real gates location of a given mapping during a simulated annealing-based attack. This defense consists of two steps, first a greedy gate swapping defense [20], and second, a measurement of the security elevation in terms of EMSR. The technique is evaluated using ISCAS'85 benchmarks circuits and the EMSR metric to quantify the defense effectiveness.…”
Section: A Proximity Perturbationmentioning
confidence: 99%
“…Another recent approach towards trustworthy chips is split manufacturing [124], [135], [140], [155], [156], [157], [158], [159], [160], [161], [162]. It seeks to prevent the insertion of Trojans and/or the theft of IP in the first place.…”
Section: Split Manufacturingmentioning
confidence: 99%
“…To the untrusted FEOL party, the outsourced design parts merely appear as a "sea of gates," where the missing interconnects may prevent one from (i) inferring any of the actual functionality and/or (ii) localizing particular circuitry prone or fruitful for Trojan attacks. How exactly such splitting can be rendered truly secure yet practical (in terms of reasonably low manufacturing and layout-level cost) is currently still under broad and vivid investigation [155], [156], [157], [159], [160], [161].…”
Section: Split Manufacturingmentioning
confidence: 99%