Difference between revisions of "Alkabani2008trusted"
From ACES
(Import from BibTeX) |
m (Default pdf) |
||
(One intermediate revision by the same user not shown) | |||
Line 3: | Line 3: | ||
|abstract=We have developed a methodology for unique identification of integrated circuits (ICs) that addresses untrusted fabrication and other security problems. The new method leverages nondestructive gate-level characterization of ICs post-manufacturing, revealing the hidden and unclonable uniqueness of each IC. The IC characterization uses the externally measured leakage currents for multiple input vectors. We have derived several optimization techniques for gate-level characterization. The probability of collision of IDs in presence of intra- and inter-chip correlations is computed. We also introduce a number of novel security and authentication protocols, such as hardware metering, challenge-based authentication and prevention of software piracy, that leverage the extraction of a unique ID for each IC. Experimental evaluations of the proposed approach on a large set of benchmark examples reveals its effectiveness even in presence of measurement errors. | |abstract=We have developed a methodology for unique identification of integrated circuits (ICs) that addresses untrusted fabrication and other security problems. The new method leverages nondestructive gate-level characterization of ICs post-manufacturing, revealing the hidden and unclonable uniqueness of each IC. The IC characterization uses the externally measured leakage currents for multiple input vectors. We have derived several optimization techniques for gate-level characterization. The probability of collision of IDs in presence of intra- and inter-chip correlations is computed. We also introduce a number of novel security and authentication protocols, such as hardware metering, challenge-based authentication and prevention of software piracy, that leverage the extraction of a unique ID for each IC. Experimental evaluations of the proposed approach on a large set of benchmark examples reveals its effectiveness even in presence of measurement errors. | ||
|pages=102 - 117 | |pages=102 - 117 | ||
|month= | |||
|year=2008 | |||
|booktitle=Information Hiding (IH) | |booktitle=Information Hiding (IH) | ||
|title=Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach | |title=Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach | ||
|entry=inproceedings | |entry=inproceedings | ||
| | |pdf=Alkabani2008trusted.pdf | ||
}} | }} |
Latest revision as of 17:33, 9 November 2021
Alkabani2008trusted | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Y. Alkabani and F. Koushanfar and N. Kiyavash and M. Potkonjak |
booktitle | Information Hiding (IH) |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | |
note | |
number | |
organization | |
pages | 102 - 117 |
publisher | |
school | |
series | |
title | Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach |
type | |
volume | |
year | 2008 |
doi | |
issn | |
isbn | |
url | |
Alkabani2008trusted.pdf |