Difference between revisions of "Roy2008epic"
From ACES
(Import from BibTeX) |
m (Import from BibTeX) |
||
Line 2: | Line 2: | ||
|author=J. Roy and F. Koushanfar and I. Markov | |author=J. Roy and F. Koushanfar and I. Markov | ||
|abstract=As semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to mask theft and unauthorized excess production. While only recently studied, IC piracy has now become a major challenge for the electronics and defense industries. We propose a novel comprehensive technique to end piracy of integrated circuits (EPIC). It requires that every chip be activated with an external key, which can only be generated by the holder of IP rights, and cannot be duplicated. EPIC is based on (i) automatically-generated chip IDs, (ii) a novel combinational locking algorithm, and (Hi) innovative use of public-key cryptography. Our evaluation suggests that the overhead of EPIC on circuit delay and power is negligible, and the standard flows for verification and test do not require change. In fact, major required components have already been integrated into several chips in production. We also use formal methods to evaluate combinational locking and computational attacks. A comprehensive protocol analysis concludes that EPIC is surprisingly resistant to various piracy attempts. | |abstract=As semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to mask theft and unauthorized excess production. While only recently studied, IC piracy has now become a major challenge for the electronics and defense industries. We propose a novel comprehensive technique to end piracy of integrated circuits (EPIC). It requires that every chip be activated with an external key, which can only be generated by the holder of IP rights, and cannot be duplicated. EPIC is based on (i) automatically-generated chip IDs, (ii) a novel combinational locking algorithm, and (Hi) innovative use of public-key cryptography. Our evaluation suggests that the overhead of EPIC on circuit delay and power is negligible, and the standard flows for verification and test do not require change. In fact, major required components have already been integrated into several chips in production. We also use formal methods to evaluate combinational locking and computational attacks. A comprehensive protocol analysis concludes that EPIC is surprisingly resistant to various piracy attempts. | ||
|month= | |||
|year=2008 | |||
|booktitle=Design Automation and Test in Europe (DATE) | |booktitle=Design Automation and Test in Europe (DATE) | ||
|title=EPIC: Ending Piracy of Integrated Circuits | |title=EPIC: Ending Piracy of Integrated Circuits | ||
|entry=inproceedings | |entry=inproceedings | ||
}} | }} |
Revision as of 03:34, 4 September 2021
Roy2008epic | |
---|---|
entry | inproceedings |
address | |
annote | |
author | J. Roy and F. Koushanfar and I. Markov |
booktitle | Design Automation and Test in Europe (DATE) |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | |
title | EPIC: Ending Piracy of Integrated Circuits |
type | |
volume | |
year | 2008 |
doi | |
issn | |
isbn | |
url | |