Yousra Alkabani

Learn More
We introduce a <i>remote activation</i> scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy. Remote activation enables designers to lock each working <b>IC</b> and to then remotely enable it. The new method exploits <i>inherent unclonable variability</i> in modern manufacturing for unique identification (ID) and(More)
We introduce the first active hardware metering scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy and runtime tampering. The novel metering method simultaneously employs inherent unclonable variability in modern manufacturing technology, and functionality preserving alternations of the structural IC(More)
Nowadays, hardware Trojan protection became a hot topic especially after the horizontal silicon industry business model. Third party IPs are the building blocks of many critical systems and that arises the question of confidentiality and reliability of these blocks. In this work, we present novel methods for system protection and Trojan detection that(More)
We have developed a methodology for unique identification of integrated circuits (ICs) that addresses untrusted fabrication and other security problems. The new method leverages nondestructive gate-level characterization of ICs post-manufacturing, revealing the hidden and unclonable uniqueness of each IC. The IC characterization uses the externally measured(More)
The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) during the design process. Recent research is performed to detect Trojans embedded at manufacturing time by(More)
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotely monitor, control, enable, or disable each individual IP on each chip. The approach introduces a paradigm shift in the microelectronic business model, nurturing smaller(More)
The problem of hardware Trojan detection has been recently studied extensively. The use of traditional testing strategies to detect hardware Trojans is not effective because the probability of triggering a hardware Trojan during testing is very low. Moreover, the small size of the Trojan compared to the overall size of the chip reduces the impact of the(More)
We present the first approach for post-silicon leakage power reduction through <i>input vector control (IVC)</i> that takes into account the impact of the <i>manufacturing variability (MV).</i> Because of the MV, the integrated circuits (ICs) implementing one design require different input vectors to achieve their lowest leakage states. We address two major(More)