메뉴 건너뛰기




Volumn , Issue , 2013, Pages 709-720

Security analysis of integrated circuit camouflaging

Author keywords

ic camouflaging; ic reverse engineering; ip piracy; ip protection

Indexed keywords

BENCHMARK CIRCUIT; IC TESTING; IP PIRACIES; IP PROTECTION; NETLIST; SECURITY ANALYSIS; SELECT GATE; STANDARD CELL;

EID: 84889058172     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516656     Document Type: Conference Paper
Times cited : (387)

References (39)
  • 1
    • 84889039676 scopus 로고    scopus 로고
    • Chipworks, "Intel's 22-nm Tri-gate Transistors Exposed," http://www.chipworks.com/blog/technologyblog/2012/04/23/intels-22-nm-tri-gate- transistors-exposed/, 2012.
    • (2012) Intel's 22-nm Tri-gate Transistors Exposed
  • 5
    • 84889036860 scopus 로고    scopus 로고
    • Chipworks, "Reverse engineering software," http://www. chipworks.com/en/technical-competitive-analysis/resources/reerse-engineering- software.
    • Reverse Engineering Software
  • 6
    • 84889049339 scopus 로고    scopus 로고
    • Degate, http://www.degate.org/documentation/.
  • 9
    • 84889045731 scopus 로고    scopus 로고
    • Method and apparatus for camouflaging a standard cell based integrated circuit with micro circuits and post processing
    • US Patent no. 20120139582
    • J. P. Baukus, L. W. Chow, R. P. Cocchi, and B. J. Wang, "Method and apparatus for camouflaging a standard cell based integrated circuit with micro circuits and post processing," US Patent no. 20120139582, 2012.
    • (2012)
    • Baukus, J.P.1    Chow, L.W.2    Cocchi, R.P.3    Wang, B.J.4
  • 10
    • 84889036301 scopus 로고    scopus 로고
    • Building block for a secure cmos logic cell library
    • US Patent no. 8111089
    • J. P. Baukus, L. W. Chow, R. P. Cocchi, P. Ouyang, and B. J. Wang, "Building block for a secure cmos logic cell library," US Patent no. 8111089, 2012.
    • (2012)
    • Baukus, J.P.1    Chow, L.W.2    Cocchi, R.P.3    Ouyang, P.4    Wang, B.J.5
  • 11
    • 84889044600 scopus 로고    scopus 로고
    • Integrated circuits protected against reverse engineering and method for fabricating the same using an apparent metal contact line terminating on field oxide
    • US Patent no. 20020096776
    • J. P. Baukus, L. W. Chow, and W. Clark, "Integrated circuits protected against reverse engineering and method for fabricating the same using an apparent metal contact line terminating on field oxide," US Patent no. 20020096776, 2002.
    • (2002)
    • Baukus, J.P.1    Chow, L.W.2    Clark, W.3
  • 13
    • 84888995535 scopus 로고    scopus 로고
    • Camouflaging a standard cell based integrated circuit
    • US Patent no. 8151235
    • J. P. Baukus, L. W. Chow, R. P. Cocchi, P. Ouyang, and B. J. Wang, "Camouflaging a standard cell based integrated circuit," US Patent no. 8151235, 2012.
    • (2012)
    • Baukus, J.P.1    Chow, L.W.2    Cocchi, R.P.3    Ouyang, P.4    Wang, B.J.5
  • 14
    • 84889049565 scopus 로고    scopus 로고
    • Conductive channel pseudo block process and circuit to inhibit reverse engineering
    • US Patent no. 8258583
    • J. P. Baukus, L.-W. Chow, J. W. M. Clark, and G. J. Harbison, "Conductive channel pseudo block process and circuit to inhibit reverse engineering," US Patent no. 8258583, 2012.
    • (2012)
    • Baukus, J.P.1    Chow, L.-W.2    Clark, J.W.M.3    Harbison, G.J.4
  • 17
    • 0033359923 scopus 로고    scopus 로고
    • Unveiling the ISCAS-85 benchmarks: A case study in reverse engineering
    • M. Hansen, H. Yalcin, and J. Hayes, "Unveiling the ISCAS-85 benchmarks: a case study in reverse engineering," IEEE Design Test of Computers, vol. 16, no. 3, pp. 72-80, 1999.
    • (1999) IEEE Design Test of Computers , vol.16 , Issue.3 , pp. 72-80
    • Hansen, M.1    Yalcin, H.2    Hayes, J.3
  • 19
    • 84888984254 scopus 로고    scopus 로고
    • Cadence, "RTL Compiler," www.cadence.com/products/ld/rtl- compiler.
    • RTL Compiler
  • 21
    • 84889075389 scopus 로고    scopus 로고
    • Practical, lightweight secure inclusion of third-party intellectual property
    • A. Waksman, J. Eum, and S. Sethumadhavan, "Practical, lightweight secure inclusion of third-party intellectual property," IEEE Design & Test, no. 99, pp. 1-1, 2013.
    • (2013) IEEE Design & Test , Issue.99 , pp. 1-1
    • Waksman, A.1    Eum, J.2    Sethumadhavan, S.3
  • 22
    • 84889072332 scopus 로고    scopus 로고
    • Oracle, "Opensparc internals," http://www.oracle.com/ technetwork/systems/opensparc/opensparc-internals-book-1500271.pdf.
    • Opensparc Internals
  • 23
    • 85077688405 scopus 로고    scopus 로고
    • Active hardware metering for intellectual property protection and security
    • Y. Alkabani and F. Koushanfar, "Active hardware metering for intellectual property protection and security," in the Proc. of USENIX security, pp. 291-306, 2007.
    • (2007) Proc. of USENIX Security , pp. 291-306
    • Alkabani, Y.1    Koushanfar, F.2
  • 24
    • 78149236064 scopus 로고
    • Avalanche characteristics of substitution-permutation encryption networks
    • H. Heys and S. Tavares, "Avalanche characteristics of substitution-permutation encryption networks," IEEE Transactions on Computers, vol. 44, no. 9, pp. 1131-1139, 1995.
    • (1995) IEEE Transactions on Computers , vol.44 , Issue.9 , pp. 1131-1139
    • Heys, H.1    Tavares, S.2
  • 26
    • 84888998162 scopus 로고    scopus 로고
    • Method of recovering a gate-level netlist from a transistor-level
    • US Patent no. 6190433
    • W. M. V. Fleet and M. R. Dransfield, "Method of recovering a gate-level netlist from a transistor-level," US Patent no. 6190433, 1998.
    • (1998)
    • Fleet, W.M.V.1    Dransfield, M.R.2
  • 30
    • 77958126199 scopus 로고    scopus 로고
    • EPIC: Ending Piracy of Integrated Circuits
    • J. Roy, F. Koushanfar, and I. Markov, "EPIC: Ending Piracy of Integrated Circuits," IEEE Computer, vol. 43, no. 10, pp. 30-38, 2010.
    • (2010) IEEE Computer , vol.43 , Issue.10 , pp. 30-38
    • Roy, J.1    Koushanfar, F.2    Markov, I.3
  • 33
    • 76949085013 scopus 로고    scopus 로고
    • Preventing IC Piracy Using Reconfigurable Logic Barriers
    • A. Baumgarten, A. Tyagi, and J. Zambreno, "Preventing IC Piracy Using Reconfigurable Logic Barriers," IEEE Design and Test of Computers, vol. 27, no. 1, pp. 66-75, 2010.
    • (2010) IEEE Design and Test of Computers , vol.27 , Issue.1 , pp. 66-75
    • Baumgarten, A.1    Tyagi, A.2    Zambreno, J.3
  • 37
    • 34547307341 scopus 로고    scopus 로고
    • Physical Unclonable Functions for Device Authentication and Secret Key Generation
    • G. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," in the Proc. of the IEEE/ACM Design Automation Conference, pp. 9-14, 2007.
    • (2007) Proc. of the IEEE/ACM Design Automation Conference , pp. 9-14
    • Suh, G.1    Devadas, S.2
  • 39
    • 34047189028 scopus 로고    scopus 로고
    • Cadence, "SoC Encounter," http://www.cadence.com/products/di/ soc-encounter/ pages/default.aspx.
    • SoC Encounter


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.