Desai et al., 2013 - Google Patents
Anti-counterfeit integrated circuits using fuse and tamper-resistant time-stamp circuitryDesai et al., 2013
View PDF- Document ID
- 12976304267150585525
- Author
- Desai A
- Ganta D
- Hsiao M
- Nazhandali L
- Wang C
- Hall S
- Publication year
- Publication venue
- 2013 IEEE International Conference on Technologies for Homeland Security (HST)
External Links
Snippet
Counterfeit Integrated Circuits (ICs) have become an important security issue in recent years, in which counterfeit ICs that perform incorrectly or sub-par to the expected can lead to catastrophic consequences in safety and/or mission-critical applications, in addition to the …
- 238000000034 method 0 abstract description 32
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3185—Reconfiguring for testing, e.g. LSSD, partitioning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xu et al. | Electronics supply chain integrity enabled by blockchain | |
Contreras et al. | Secure split-test for preventing IC piracy by untrusted foundry and assembly | |
Tehranipoor et al. | Integrated circuit authentication | |
Engels et al. | The end of logic locking? a critical view on the security of logic locking | |
Knechtel et al. | Towards secure composition of integrated circuits and electronic systems: On the role of EDA | |
Shakya et al. | Introduction to hardware obfuscation: Motivation, methods and evaluation | |
Karmakar et al. | A cellular automata guided finite-state-machine watermarking strategy for IP protection of sequential circuits | |
Zhang et al. | An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies | |
Vosatka | Introduction to hardware trojans | |
Yu et al. | Exploiting hardware obfuscation methods to prevent and detect hardware trojans | |
Karmakar et al. | Hardware IP protection using logic encryption and watermarking | |
Kumar et al. | Secure split test techniques to prevent IC piracy for IoT devices | |
Chen et al. | Hardware protection via logic locking test points | |
Tehranipoor et al. | Hardware security primitives | |
Engels et al. | A critical view on the real-world security of logic locking | |
Hamdioui et al. | Hacking and protecting IC hardware | |
Akkaya et al. | Secure chip odometers using intentional controlled aging | |
Desai et al. | Anti-counterfeit integrated circuits using fuse and tamper-resistant time-stamp circuitry | |
Forte et al. | Supply-chain security for cyberinfrastructure [Guest editors' introduction] | |
Basak et al. | PiRA: IC authentication utilizing intrinsic variations in pin resistance | |
Yu et al. | Hardware hardening approaches using camouflaging, encryption, and obfuscation | |
Tehranipoor et al. | Counterfeit and recycled ic detection | |
Guin | Establishment of trust and integrity in modern supply chain from design to resign | |
Desai | Anti-Counterfeit and Anti-Tamper Hardware Implementation using Hardware Obfuscation | |
Zarrinchian | A chip activation protocol for preventing IC recycling |