Watermarking in Hard Intellectual Property for Pre-Fab and Post-Fab Verification
Citations
References
316 citations
"Watermarking in Hard Intellectual P..." refers background or methods in this paper
...In SoC company, a malicious designer may generate additional copies of the layout for reselling or redesign its interface for extracting information from it [8]....
[...]
...The technique in [8] precisely measures actual combinational delay of large number of paths to detect the presence of a HTH, but is not effective for process invariant authentication of a hardware IP core....
[...]
263 citations
"Watermarking in Hard Intellectual P..." refers methods in this paper
...The gate level characterization-based techniques, see [10], use physical properties of the gates for characterization of ICs and process invariant detection of hardware Trojan....
[...]
255 citations
234 citations
"Watermarking in Hard Intellectual P..." refers methods in this paper
...Physically unclonable function (PUF)-based techniques, such as [7], authenticate each IC instance using delay/power characteristic of a PUF circuit....
[...]
220 citations
Additional excerpts
...not support post-fab verification [2], [3]....
[...]