Protect Your Chip Design Intellectual Property: An Overview

02/14/2019
by   Johann Knechtel, et al.
0

The increasing cost of integrated circuit (IC) fabrication has driven most companies to "go fabless" over time. The corresponding outsourcing trend gave rise to various attack vectors, e.g., illegal overproduction of ICs, piracy of the design intellectual property (IP), or insertion of hardware Trojans (HTs). These attacks are possibly conducted by untrusted entities residing all over the supply chain, ranging from untrusted foundries, test facilities, even to end-users. To overcome this multitude of threats, various techniques have been proposed over the past decade. In this paper, we review the landscape of IP protection techniques, which can be classified into logic locking, layout camouflaging, and split manufacturing. We discuss the history of these techniques, followed by state-of-the-art advancements, relevant limitations, and scope for future work.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/16/2018

Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs

With the globalization of manufacturing and supply chains, ensuring the ...
research
05/15/2019

Threats on Logic Locking: A Decade Later

To reduce the cost of ICs and to meet the market's demand, a considerabl...
research
06/11/2020

Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

Integrated circuits (ICs) are the foundation of all computing systems. T...
research
11/14/2018

Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices

Hardware-centric security threats have emerged in every stage of the IC ...
research
11/14/2017

Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging

Layout camouflaging (LC) is a promising technique to protect chip design...
research
05/20/2020

Securing Digital Systems via Split-Chip Obfuscation

Security is an important facet of integrated circuit design for many app...
research
12/06/2021

Hardware Trojan Insertion in Finalized Layouts: a Silicon Demonstration

Owning a high-end semiconductor foundry is a luxury very few companies c...

Please sign up or login with your details

Forgot password? Click here to reset