Techniques for foundry identification
@article{Wendt2014TechniquesFF, title={Techniques for foundry identification}, author={James Bradley Wendt and Farinaz Koushanfar and Miodrag Potkonjak}, journal={2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)}, year={2014}, pages={1-6} }
Foundry identification is essential for many tasks including intellectual property protection, trust, and preventing counterfeiting. In this paper, we introduce statistical techniques for foundry detection, specifically for identifying from which foundry a particular chip originates from. The key idea is to consider the distributions of channel lengths and threshold voltages after employing a variant of SAT that extracts these two metrics. We apply Kolmogorov-Smirnov and other statistical tests…
20 Citations
Electronic forensic techniques for manufacturer attribution
- Computer Science2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
- 2016
The design, measurements and analysis of 159 silicon ICs are presented, which were built as a proof of concept for this purpose, for developing and verifying a signature for a microelectronics manufacturing facility (fab).
Active Hardware Metering by Finite State Machine Obfuscation
- Computer Science
- 2017
This chapter presents a detailed description and comprehensive discussion of the first known method for active IC metering and IC piracy prevention which allow uniquely locking each manufactured IC…
Process Specific Functions for Assurance of Analog/Mixed-Signal Integrated Circuits
- Computer Science2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS)
- 2019
This paper investigates the process-induced variation response of analog and mixed-signal ICs to yield anti-counterfeiting and anti-cloning design techniques. It defines unique behaviors called…
A Non-invasive Technique to Detect Authentic/Counterfeit SRAM Chips
- Computer ScienceArXiv
- 2021
A framework that detects major counterfeit static random-access memory (SRAM) types by attesting/identifying the origin of the manufacturer by generating a single signature for a manufacturer and does not require any exhaustive registration/authentication process is proposed.
Hardware IP Watermarking and Fingerprinting
- Computer Science
- 2016
The primary objective is to provide sound treatment of the foundations of hardware watermarking and fingerprinting, as well as key research contributions to the field, and to identify dominating trends and briefly outline emerging hardware IP protection.
Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin
- Computer Science2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
- 2020
This paper proposes a technique to identify the DRAM origin (i.e., the origin of the manufacturer and the specification of individual DRAM) to detect and prevent counterfeit DRAM modules and shows that the proposed method reliably identifies off-the-shelfDRAM modules from three major manufacturers.
A Primer on Hardware Security: Models, Methods, and Metrics
- Computer ScienceProceedings of the IEEE
- 2014
This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.
Can the SHIELD protect our integrated circuits?
- Computer Science2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS)
- 2014
The SHIELD threat model and its potential for addressing a number of standing challenges in this area are discussed and the dire need for open evaluation and thorough security analysis of SHIELD is emphasized.
Security aspects of analog and mixed-signal circuits
- Computer Science2016 IEEE 21st International Mixed-Signal Testing Workshop (IMSTW)
- 2016
This paper summarizes hardware security threats known today, along with applicable countermeasures, and discusses their relevance in the analog and mixed-signal (AMS) domain to help AMS designers to realistically assess the exposure of their systems to security threats.
Challenges and Methodologies of Hardware Security
- Computer Science2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA)
- 2018
A brief survey of security issues found in various application domains is presented, based on a collection of over seventy papers in IEEE Xplore archived since 2011, and specific hardware security challenges are connected and mapped to each application domain.
References
SHOWING 1-10 OF 27 REFERENCES
Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach
- Computer ScienceInformation Hiding
- 2008
A methodology for unique identification of integrated circuits (ICs) that addresses untrusted fabrication and other security problems, and introduces a number of novel security and authentication protocols, such as hardware metering, challenge-based authentication and prevention of software piracy.
Hardware Trojan horse detection using gate-level characterization
- Computer Science2009 46th ACM/IEEE Design Automation Conference
- 2009
A technique for recovery of characteristics of gates in terms of leakage current, switching power, and delay is introduced, which utilizes linear programming to solve a system of equations created using nondestructive measurements of power or delays to detect embedded HTHs.
Scalable Hardware Trojan Diagnosis
- Computer Science, PhysicsIEEE Transactions on Very Large Scale Integration (VLSI) Systems
- 2012
This work has developed a scalable HT detection and diagnosis approach that uses segmentation and gate level characterization (GLC) and is capable of detecting and diagnosing HTs accurately on large circuits.
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
- Computer ScienceIEEE Transactions on Computers
- 2009
It is demonstrated that a 512-byte SRAM fingerprint contains sufficient entropy to generate 128-bit true random numbers and that the generated numbers pass the NIST tests for runs, approximate entropy, and block frequency.
Robust passive hardware metering
- Computer Science2011 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
- 2011
By using threshold voltage for ID creation, this work is able to quantify the probability of coincidence between legitimate and pirated ICs, thus for the first time quantitatively and accurately demonstrating the effectiveness of a hardware metering approach.
Gate-level characterization: Foundations and hardware security applications
- Computer ScienceDesign Automation Conference
- 2010
The simulation results show that the thermally conditioned GLC approach is capable of characterizing all the gates with an average error less than the measurement error, and it can detect HTHs with 100% accuracy on a target circuit.
Analysis and Modeling of CD Variation for Statistical Static Timing
- Computer Science2006 IEEE/ACM International Conference on Computer Aided Design
- 2006
This study studies 5 different correlation models and their associated SSTA methods using 35420 critical dimension measurements that were extracted from 23 reticles on 5 wafers in a 130nm CMOS process and shows that the simple models provide comparable accuracy to that of the more complex ones, while incurring significantly less runtime and implementation difficulty.
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
- Computer Science, MathematicsInformation Hiding
- 2009
Using PPUFs, this work has developed conceptually new secret key exchange and public key protocols that are resilient against physical and side channel attacks and do not employ unproven mathematical conjectures.
Hardware metering
- Computer ScienceProceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232)
- 2001
This work introduces the first hardware metering scheme that enables reliable low overhead proofs for the number of manufactured parts and establishes the connection between the requirements for hardware and synthesis process.
The bidirectional polyomino partitioned PPUF as a hardware security primitive
- Computer Science2013 IEEE Global Conference on Signal and Information Processing
- 2013
Next generation CMOS-compatible technologies, such as memristors and nanowires, whose components exhibit non-linear circuit characteristics, are proposed to use for the creation of public physical unclonable functions, and a novel architecture of PPUF polyomino partitioning is introduced.