scispace - formally typeset
Proceedings ArticleDOI

CSST: An Efficient Secure Split-Test for Preventing IC Piracy

Reads0
Chats0
TLDR
A new Secure Split-Test is proposed to give control over testing back to the IP owner to prevent shipping overproduction and defective chips from reaching the supply chain and considerably simplifies the communication required between foundry and IP owner.
Abstract
With the high costs associated with modern IC fabrication, most semiconductor companies have gone fabless, i.e., they outsource manufacturing of their designs to contract foundries. This horizontal business model has led to many well documented issues associated with untrusted foundries including IC overproduction and shipping improperly or insufficiently tested chips. Entering such chips in the supply chain can be catastrophic for critical applications. We propose a new Secure Split-Test to give control over testing back to the IP owner. Each chip is locked during test. The IP owner is the only entity who can interpret the locked test results and unlock passing chips. In this way, SST can prevent shipping overproduction and defective chips from reaching the supply chain. The proposed method considerably simplifies the communication required between the foundry and IP owner compared to the original version of the secure split test. The results demonstrate that our new technique is more secure than the original and with less communication barriers.

read more

Citations
More filters
Proceedings ArticleDOI

CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly

TL;DR: A new Secure Split-Test (SST) scheme called the Connecticut SST (CSST) in which the IP owner takes full control over testing is proposed, which is more secure than the original and has lower communication overheads.
Journal ArticleDOI

Development and Evaluation of Hardware Obfuscation Benchmarks

TL;DR: A set of well-defined benchmarks obfuscated with some popular methods that are made publicly available and provide the first evaluation of several obfuscation approaches based on the metrics and existing attacks using this new suite.
Proceedings ArticleDOI

TGA: An Oracle-less and Topology-Guided Attack on Logic Locking

TL;DR: This paper presents a novel oracle-less and topology-guided attack denoted as TGA, which relies on identifying repeated functions for determining the value of a key bit and presents a solution to thwart TGA and make logic locking secure.
Proceedings ArticleDOI

Exploiting DRAM Latency Variations for Generating True Random Numbers

TL;DR: The silicon results from Samsung and Micron DDR3 DRAM modules show that the proposed DRAM-latency based TRNG is robust (against different operating conditions and environmental variations) and acceptably fast.
Proceedings ArticleDOI

Comparative Analysis of Hardware Obfuscation for IP Protection

TL;DR: This paper presents an overview of obfuscation techniques and a qualitative comparison of the two major types, Sequential and combinational obfuscation, and proposes multiple methods for each type.
References
More filters
Journal ArticleDOI

Extracting secret keys from integrated circuits

TL;DR: It is shown that arbiter-based PUFs are realizable and well suited to build key-cards that need to be resistant to physical attacks and to be identified securely and reliably over a practical range of environmental variations such as temperature and power supply voltage.
Proceedings ArticleDOI

EPIC: ending piracy of integrated circuits

TL;DR: A novel comprehensive technique to end piracy of integrated circuits (EPIC), which requires that every chip be activated with an external key, which can only be generated by the holder of IP rights, and cannot be duplicated.
Proceedings ArticleDOI

Security analysis of logic obfuscation

TL;DR: This work demonstrates that an attacker can decipher the obfuscated nctlist, in a time linear to the number of keys, by sensitizing the key values to the output, and develops techniques to fix this vulnerability and make obfuscation truly exponential in thenumber of inserted keys.
Journal ArticleDOI

HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection

TL;DR: Simulation results for a set of ISCAS-89 benchmark circuits and the advanced-encryption-standard IP core show that high levels of security can be achieved at less than 5% area and power overhead under delay constraint.
Proceedings Article

Active hardware metering for intellectual property protection and security

TL;DR: The first active hardware metering scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy and runtime tampering is introduced and has a low-overhead in terms of power, delay, and area, while it is extremely resilient against the considered attacks.
Related Papers (5)
Trending Questions (1)
Is signal more secure than Facetime?

The results demonstrate that our new technique is more secure than the original and with less communication barriers.