Difference between revisions of "Roy2008epic"

From ACES

(Import from BibTeX)
 
m (Import from BibTeX)
Line 2: Line 2:
|author=J. Roy and F. Koushanfar and I. Markov
|author=J. Roy and F. Koushanfar and I. Markov
|abstract=As semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to mask theft and unauthorized excess production. While only recently studied, IC piracy has now become a major challenge for the electronics and defense industries. We propose a novel comprehensive technique to end piracy of integrated circuits (EPIC). It requires that every chip be activated with an external key, which can only be generated by the holder of IP rights, and cannot be duplicated. EPIC is based on (i) automatically-generated chip IDs, (ii) a novel combinational locking algorithm, and (Hi) innovative use of public-key cryptography. Our evaluation suggests that the overhead of EPIC on circuit delay and power is negligible, and the standard flows for verification and test do not require change. In fact, major required components have already been integrated into several chips in production. We also use formal methods to evaluate combinational locking and computational attacks. A comprehensive protocol analysis concludes that EPIC is surprisingly resistant to various piracy attempts.
|abstract=As semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to mask theft and unauthorized excess production. While only recently studied, IC piracy has now become a major challenge for the electronics and defense industries. We propose a novel comprehensive technique to end piracy of integrated circuits (EPIC). It requires that every chip be activated with an external key, which can only be generated by the holder of IP rights, and cannot be duplicated. EPIC is based on (i) automatically-generated chip IDs, (ii) a novel combinational locking algorithm, and (Hi) innovative use of public-key cryptography. Our evaluation suggests that the overhead of EPIC on circuit delay and power is negligible, and the standard flows for verification and test do not require change. In fact, major required components have already been integrated into several chips in production. We also use formal methods to evaluate combinational locking and computational attacks. A comprehensive protocol analysis concludes that EPIC is surprisingly resistant to various piracy attempts.
|month=
|year=2008
|booktitle=Design Automation and Test in Europe (DATE)
|booktitle=Design Automation and Test in Europe (DATE)
|title=EPIC: Ending Piracy of Integrated Circuits
|title=EPIC: Ending Piracy of Integrated Circuits
|entry=inproceedings
|entry=inproceedings
|date=2008-20-01
}}
}}

Revision as of 03:34, 4 September 2021

Roy2008epic
entryinproceedings
address
annote
authorJ. Roy and F. Koushanfar and I. Markov
booktitleDesign Automation and Test in Europe (DATE)
chapter
edition
editor
howpublished
institution
journal
month
note
number
organization
pages
publisher
school
series
titleEPIC: Ending Piracy of Integrated Circuits
type
volume
year2008
doi
issn
isbn
url
pdf


Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093