3,198 Hits in 6.4 sec

Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering

Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Platzer, Wolfgang Kastner
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
On the downside, attackers can use these test modes to break IC device security and extract sensitive information such as the firmware implementation or secret key material.  ...  In this work, we show that limited effort silicon reverse engineering can be effectively used to discover secret testing modes and that proposed obfuscation based countermeasures can be circumvented without  ...  testing modes can easily be discovered through silicon reverse engineering.  ... 
doi:10.1145/2660267.2660301 dblp:conf/ccs/KammerstetterMBPK14 fatcat:jovrwvreznhvfel7tzh2zjz4wa

Robust optical physical unclonable function using disordered photonic integrated circuits

Farhan Bin Tarik, Azadeh Famili, Yingjie Lao, Judson D. Ryckman
2020 Nanophotonics  
This is achieved using an integrated quasicrystal interferometer (QCI) which sensitively probes disorder while: (1) ensuring all modes are engineered to exhibit approximately the same confinement factor  ...  in the predominant thermo-optic medium (e. g. silicon), and (2) constraining the transverse spatial-mode and polarization degrees of freedom.  ...  Fabrication Device fabrication and testing was carried out through the Silicon Electronic-Photonic Integrated Circuits program [62] .  ... 
doi:10.1515/nanoph-2020-0049 fatcat:qstwtikiszcvxjbbbzsq2dbiu4

Reliable Systems on Unreliable Fabrics

Todd Austin, Valeria Bertacco, Scott Mahlke, Yu Cao
2008 IEEE Design & Test of Computers  
Likewise, the Reliability and Security Engine project is developing a processor-level framework that provides security guarantees along with transparent application-specific reliability.  ...  design integrity.  ... 
doi:10.1109/mdt.2008.107 fatcat:ykmurvstufcvrevyigxcyp2qhu

LED Failure Modes Implications in Ex-e Applications

Roberto Sebastiano Faranda, Lorenzo Farnè, Kim Fumagalli
2015 Journal of Energy and Power Engineering  
To evaluate the reliability of the LED technology in order to determine the safety integrity through knowledge of LED failure rates and failure modes could be possible to adopt the instruments required  ...  In particular, the gold filament can deform until it breaks, causing an open circuit situation (Fig. 14) .  ... 
doi:10.17265/1934-8975/2015.11.007 fatcat:veyskdssjfcrlk5ju5lae7656y

ATPG-Guided Fault Injection Attacks on Logic Locking [article]

Ayush Jain, Tanjidur Rahman, Ujjwal Guin
2020 arXiv   pre-print
The proposed attack is generic and can be extended to break any logic locked circuits.  ...  Over the past decade, different attacks have been proposed to break logic locking, simultaneously motivating researchers to develop more secure countermeasures.  ...  The 50x lens is equipped with a correction ring for silicon substrate thickness. The laser diode have two operation modes -a) low power (200 mW ) pulse mode, and b) high power (800 mW ) impulse mode.  ... 
arXiv:2007.10512v1 fatcat:qhkn25jacfamfiqdp4uda3abyu

Survey of hardware protection of design data for integrated circuits and intellectual properties

Brice Colombier, Lilian Bossuet
2014 IET Computers & Digital Techniques  
Over the past ten years, the designers of integrated circuits and intellectual properties have faced increasing threats including counterfeiting, reverse-engineering and theft.  ...  Coupled with increasing pressure to decrease the cost and increase the performance of integrated circuits, the design of a secure, efficient, lightweight protection scheme for design data is a serious  ...  An efficient protection method should be easy to unlock by the end user, but hard to analyse and break from a reverse-engineering point of view.  ... 
doi:10.1049/iet-cdt.2014.0028 fatcat:c2gzjh2mkbf7tjifyd44lrvrru

Breakthrough Silicon Scanning Discovers Backdoor in Military Chip [chapter]

Sergei Skorobogatov, Christopher Woods
2012 Lecture Notes in Computer Science  
Clearly this means the device is wide open to intellectual property (IP) theft, fraud, re-programming as well as reverse engineering of the design which allows the introduction of a new backdoor or Trojan  ...  damage the device.  ...  There is a MAC security feature to prevent arbitrary writing in AES mode through validation of data.  ... 
doi:10.1007/978-3-642-33027-8_2 fatcat:tbcqe3s6ubhnnfholsxc6v5du4

COMA: Communication and Obfuscation Management Architecture [article]

Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan
2019 arXiv   pre-print
circuits.  ...  Second, it implements a mechanism by which the key sent for unlocking an obfuscated circuit changes after each activation (even for the same device), transforming the key into a dynamically changing license  ...  Background Active metering, Secure Split-Test, logic obfuscation, and solutions such as Ending Piracy of Integrated Circuits (EPIC) have been proposed to protect ICs from supply chain-related security  ... 
arXiv:1909.00493v1 fatcat:naee66jm4rg6njwn2rgefgap2u

FPGA Security: Motivations, Features, and Applications

Stephen M. Trimberger, Jason J. Moore
2014 Proceedings of the IEEE  
Motivated by specific threats, this paper describes FPGA security primitives from multiple FPGA vendors and gives examples of those primitives in use in applications.  ...  Reverse Engineering An adversary may reverse engineer the bitstream to recover the circuit design that it implements.  ...  The base array design is subject to all the supply chain trust and security concerns as any other integrated circuit, including questions about tampering with tools, supply-chain control, and reverse engineering  ... 
doi:10.1109/jproc.2014.2331672 fatcat:qtwk2gqhzjfqjfjqvpptalop6m

Logic Locking Using Hybrid CMOS and Emerging SiNW FETs

Qutaiba Alasad, Jiann-Shuin Yuan, Yu Bi
2017 Electronics  
The outsourcing of integrated circuit (IC) fabrication services to overseas manufacturing foundry has raised security and privacy concerns with regard to intellectual property (IP) protection as well as  ...  the integrity maintenance of the fabricated chips.  ...  Once the NCFET fabrication is done, it is extremely difficult to distinguish which mode NCFET stays because the reverse engineering cannot have the advanced SEMs to identify the devices.  ... 
doi:10.3390/electronics6030069 fatcat:thauh7fsvfcs7duosi4knqesbm

A Survey on Chip to System Reverse Engineering

Shahed E. Quadir, Junlin Chen, Domenic Forte, Navid Asadizanjani, Sina Shahbazmohamadi, Lei Wang, John Chandy, Mark Tehranipoor
2016 ACM Journal on Emerging Technologies in Computing Systems  
In this paper, we will be presenting a survey of reverse engineering and anti-reverse engineering techniques on the chip, board, and system levels.  ...  The reverse engineering (RE) of electronic chips and systems can be used with honest and dishonest intentions.  ...  In this survey, we shall cover the reverse engineering (RE) of electronic devices from chip to system levels: 1) Chip-level reverse engineering (RE): A chip is an integrated circuit comprised of electronic  ... 
doi:10.1145/2755563 fatcat:uzdampyd6fc2fg2axhn7ydnioi

Hardware Trojan Attacks: Threat Analysis and Countermeasures

Swarup Bhunia, Michael S. Hsiao, Mainak Banga, Seetharam Narasimhan
2014 Proceedings of the IEEE  
Post-silicon, the design can be verified either through destructive depackaging and reverse engineering of the IC [3] , or by comparing its functionality or circuit characteristics with a golden version  ...  THE THREAT Hardware Trojan attacks have emerged as a major security concern for integrated circuits (ICs) [1] - [5] .  ... 
doi:10.1109/jproc.2014.2334493 fatcat:kxnyfwrk6jgqrmdpga33odvofq

Making the gigabit IPsec VPN architecture secure

R. Friend
2004 Computer  
Engineers also must consider how to incorporate flow-through security solutions in OEM designs when the silicon device is not yet available.  ...  to be processed to a security acceleration integrated circuit.  ... 
doi:10.1109/mc.2004.30 fatcat:wbd7coplxrfm5aqnuuuqr5fxcy

Security policy enforcement in modern SoC designs

Sandip Ray, Yier Jin
2015 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)  
Design of security architectures involves a complex interplay of requirements from functionality, power, security, and validation.  ...  The implementation of security policies in an SoC design, often referred to as its security architecture, is a subtle composition of coordinating design modules distributed across the different IPs.  ...  Hardware reverse-engineering adversary: In this model, the adversary is assumed to be able to reverse-engineer the silicon implementation for on-chip secrets identification.  ... 
doi:10.1109/iccad.2015.7372590 dblp:conf/iccad/RayJ15 fatcat:7scz4ntwvvfr5gbfevh5rio4v4

Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security

Md Mahbub Alam, Sreeja Chowdhury, Beomsoo Park, David Munzer, Nima Maghari, Mark Tehranipoor, Domenic Forte
2017 Journal of Hardware and Systems Security  
We also express a vision for AMS security research.  ...  In the last decade and so, a large amount of research has been done to secure hardware.  ...  Post-silicon methods can be reverse engineering or analysis of power [56] , timing [57] , temperature [58] , etc. signatures of respective ICs.  ... 
doi:10.1007/s41635-017-0024-z dblp:journals/jhss/AlamCPMMTF18 fatcat:flnx7llw7jd57avlytrvzjpbye
« Previous Showing results 1 — 15 out of 3,198 results