Proceedings of the 38th annual Design Automation Conference
Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
On the (Im)possibility of Obfuscating Programs
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Intellectual Property Metering
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Remote activation of ICs for piracy prevention and digital right management
Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design
Active hardware metering for intellectual property protection and security
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Protecting bus-based hardware IP by secret sharing
Proceedings of the 45th annual Design Automation Conference
EPIC: ending piracy of integrated circuits
Proceedings of the conference on Design, automation and test in Europe
Hardware protection and authentication through netlist level obfuscation
Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design
IC activation and user authentication for security-sensitive systems
HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
IEEE Transactions on Computers
Analysis and design of active IC metering schemes
HST '09 Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust
Preventing IC Piracy Using Reconfigurable Logic Barriers
IEEE Design & Test
Ending Piracy of Integrated Circuits
Computer
Information hiding in finite state machine
IH'04 Proceedings of the 6th international conference on Information Hiding
IEEE Spectrum
Plans for Next-Gen Chips Imperiled
IEEE Spectrum
Integrated circuit digital rights management techniques using physical level characterization
Proceedings of the 11th annual ACM workshop on Digital rights management
Hi-index | 0.00 |
This paper presents an overview of hardware and Integrated Circuits (IC) metering methods. IC metering or hardware metering refers to tools, methodologies, and protocols that enable post-fabrication tracking of the ICs. Metering enables prevention and detection of overbuilt and counterfeit ICs in the dominant semiconductor contract-foundry model. Post-silicon identification and tagging of the individual ICs fabricated by the same mask is a precursor for metering: In passive metering, the ICs are specifically identified, either in terms of their functionality, or by other forms of unique identification. The identified ICs may be matched against their record in a pre-formed database that could reveal unregistered ICs or overbuilt ICs (in case of collisions). In active metering, not only the ICs are uniquely identified, but also parts of the chip's functionality can be only accessed, locked (disabled), or unlocked (enabled) by the designer and/or IP rights owners using a high level knowledge of the design not transferred to the foundry. We provide a systematic overview of the field, along with a taxonomy of available methods.