Access the full text.
Sign up today, get DeepDyve free for 14 days.
Bilgiday Yuce, N. Ghalaty, Chinmay Deshpande, C. Patrick, L. Nazhandali, P. Schaumont (2016)
FAME: Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault ResponseProceedings of the Hardware and Architectural Support for Security and Privacy 2016
Christian Krieg, C. Wolf, A. Jantsch (2016)
Malicious LUT: A stealthy FPGA Trojan injected and triggered by the design flow2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
M. Tehranipoor, F. Koushanfar (2010)
A Survey of Hardware Trojan Taxonomy and DetectionIEEE Design & Test of Computers, 27
Jin Miao, Meng Li, Subhendu Roy, Bei Yu (2016)
LRR-DPUF: Learning resilient and reliable digital physical unclonable function2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
Jeyavijayan Rajendran, Michael Sam, O. Sinanoglu, R. Karri (2013)
Security analysis of integrated circuit camouflagingProceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Pramod Subramanyan, Nestan Tsiskaridze, Wenchao Li, Adrià Gascón, W. Tan, A. Tiwari, N. Shankar, S. Seshia, S. Malik (2014)
Reverse Engineering Digital Circuits Using Structural and Functional AnalysesIEEE Transactions on Emerging Topics in Computing, 2
J. Warnock (2011)
Circuit design challenges at the 14nm technology node2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)
K. Xiao, Domenic Forte, Y. Jin, R. Karri, S. Bhunia, M. Tehranipoor (2016)
Hardware TrojansACM Transactions on Design Automation of Electronic Systems (TODAES), 22
S. Skorobogatov, C. Woods (2012)
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali (2011)
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault
Yang Xie, Ankur Srivastava (2016)
Mitigating SAT Attack on Logic LockingIACR Cryptol. ePrint Arch., 2016
Tejas Jhaveri, V. Rovner, L. Liebmann, L. Pileggi, A. Strojwas, J. Hibbeler (2010)
Co-Optimization of Circuits, Layout and Lithography for Predictive Technology Scaling Beyond GratingsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 29
Qihang Shi, K. Xiao, Domenic Forte, M. Tehranipoor (2017)
Securing Split Manufactured ICs with Wire Lifting Obfuscated Built-In Self-AuthenticationProceedings of the on Great Lakes Symposium on VLSI 2017
Mohamed Massad, S. Garg, Mahesh Tripunitara (2015)
Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes
S. Borkar (1999)
Design challenges of technology scalingIEEE Micro, 19
Adib Nahiyan, K. Xiao, Kun Yang, Yier Jin, Domenic Forte, M. Tehranipoor (2016)
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)
Kerstin Lemke-Rust, C. Paar (2006)
An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices
M. Potkonjak, V. Goudar (2014)
Public Physical Unclonable FunctionsProceedings of the IEEE, 102
[The globalization of the semiconductor industry has helped to reduce the overall cost by the worldwide distribution of integrated circuit (IC) design, fabrication, and deployment, it also introduces ever-increasing intellectual property (IP) privacy and integrity infringement. In this chapter, the major IP violations and corresponding promising protection strategies are introduced. The main materials for each chapter are also summarized.]
Published: Apr 12, 2020
Keywords: IP privacy and integrity violations; Hardware Trojan; Reverse engineering; Fault attack; Split manufacturing; IC camouflaging; Physical unclonable function
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.