首页> 外文学位 >Preventing integrated circuit piracy using reconfigurable logic barriers.
【24h】

Preventing integrated circuit piracy using reconfigurable logic barriers.

机译:使用可重新配置的逻辑屏障来防止集成电路盗版。

获取原文
获取原文并翻译 | 示例

摘要

With each new feature size, integrated circuit (IC) manufacturing costs increase. Rising expenses cause the once vertical IC supply chain to flatten out. Companies are increasing their reliance on contractors, often foreign, to supplement their supply chain deficiencies as they no longer can provide all of the services themselves. This shift has brought with it several security concerns classified under three categories: (1) Metering - controlling the number of ICs created and for whom. (2) Theft - controlling the dissemination of intellectual property (IP). (3) Trust - controlling the confidence in the IC post-fabrication. Our research focuses on providing a solution to the metering problem by restricting an attacker's access to the IC design. Our solution modifies the CAD tool flow in order to identify locations in the circuit which can be protected with reconfigurable logic barriers. These barriers require the correct key to be present for information to flow through. Incorrect key values render the IC useless as the flow of information is blocked. Our selection heuristics utilize observability and controllability don't care sets along with a node's location in the network to maximize an attacker's burden while keeping in mind the associated overhead. We implement our approach in an open-source logic synthesis tool, compare it against previous solutions and evaluate its effectiveness against a knowledgeable attacker.
机译:每增加一个新功能部件,集成电路(IC)的制造成本就会增加。不断上升的支出使曾经垂直的IC供应链变得扁平。公司越来越依赖承包商(通常是外国承包商)来弥补供应链的缺陷,因为他们不再能够自己提供所有服务。这一转变带来了一些安全问题,这些安全问题可分为三类:(1)计量-控制创建的IC的数量和服务对象。 (2)盗窃-控制知识产权的传播(IP)。 (3)信任-控制对IC后制造的信任。我们的研究重点在于通过限制攻击者对IC设计的访问来为计量问题提供解决方案。我们的解决方案修改了CAD工具流程,以识别电路中可以用可重新配置的逻辑屏障保护的位置。这些障碍要求提供正确的密钥以使信息流过。错误的键值使IC无法使用,因为信息流被阻止了。我们的选择试探法利用可观察性和可控制性,不在乎集合与网络中节点的位置,以最大程度地提高攻击者的负担,同时牢记相关的开销。我们在开源逻辑综合工具中实施我们的方法,将其与以前的解决方案进行比较,并针对知识渊博的攻击者评估其有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号