[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Desai et al., 2013 - Google Patents

Anti-counterfeit integrated circuits using fuse and tamper-resistant time-stamp circuitry

Desai et al., 2013

View PDF
Document ID
12976304267150585525
Author
Desai A
Ganta D
Hsiao M
Nazhandali L
Wang C
Hall S
Publication year
Publication venue
2013 IEEE International Conference on Technologies for Homeland Security (HST)

External Links

Snippet

Counterfeit Integrated Circuits (ICs) have become an important security issue in recent years, in which counterfeit ICs that perform incorrectly or sub-par to the expected can lead to catastrophic consequences in safety and/or mission-critical applications, in addition to the …
Continue reading at sites.usc.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3185Reconfiguring for testing, e.g. LSSD, partitioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design

Similar Documents

Publication Publication Date Title
Xu et al. Electronics supply chain integrity enabled by blockchain
Contreras et al. Secure split-test for preventing IC piracy by untrusted foundry and assembly
Tehranipoor et al. Integrated circuit authentication
Engels et al. The end of logic locking? a critical view on the security of logic locking
Knechtel et al. Towards secure composition of integrated circuits and electronic systems: On the role of EDA
Shakya et al. Introduction to hardware obfuscation: Motivation, methods and evaluation
Karmakar et al. A cellular automata guided finite-state-machine watermarking strategy for IP protection of sequential circuits
Zhang et al. An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies
Vosatka Introduction to hardware trojans
Yu et al. Exploiting hardware obfuscation methods to prevent and detect hardware trojans
Karmakar et al. Hardware IP protection using logic encryption and watermarking
Kumar et al. Secure split test techniques to prevent IC piracy for IoT devices
Chen et al. Hardware protection via logic locking test points
Tehranipoor et al. Hardware security primitives
Engels et al. A critical view on the real-world security of logic locking
Hamdioui et al. Hacking and protecting IC hardware
Akkaya et al. Secure chip odometers using intentional controlled aging
Desai et al. Anti-counterfeit integrated circuits using fuse and tamper-resistant time-stamp circuitry
Forte et al. Supply-chain security for cyberinfrastructure [Guest editors' introduction]
Basak et al. PiRA: IC authentication utilizing intrinsic variations in pin resistance
Yu et al. Hardware hardening approaches using camouflaging, encryption, and obfuscation
Tehranipoor et al. Counterfeit and recycled ic detection
Guin Establishment of trust and integrity in modern supply chain from design to resign
Desai Anti-Counterfeit and Anti-Tamper Hardware Implementation using Hardware Obfuscation
Zarrinchian A chip activation protocol for preventing IC recycling