Back to Search Start Over

Regaining Trust in VLSI Design: Design-for-Trust Techniques.

Authors :
Rajendran, Jeyavijayan
Sinanoglu, Ozgur
Karri, Ramesh
Source :
Proceedings of the IEEE; Aug2014, Vol. 102 Issue 8, p1266-1282, 17p
Publication Year :
2014

Abstract

Designers use third-party intellectual property (IP) cores and outsource various steps in their integrated circuit (IC) design flow, including fabrication. As a result, security vulnerabilities have been emerging, forcing IC designers and end-users to reevaluate their trust in hardware. If an attacker gets hold of an unprotected design, attacks such as reverse engineering, insertion of malicious circuits, and IP piracy are possible. In this paper, we shed light on the vulnerabilities in very large scale integration (VLSI) design and fabrication flow, and survey design-for-trust (DfTr) techniques that aim at regaining trust in IC design. We elaborate on four DfTr techniques: logic encryption, split manufacturing, IC camouflaging, and Trojan activation. These techniques have been developed by reusing VLSI test principles. [ABSTRACT FROM PUBLISHER]

Details

Language :
English
ISSN :
00189219
Volume :
102
Issue :
8
Database :
Complementary Index
Journal :
Proceedings of the IEEE
Publication Type :
Academic Journal
Accession number :
97174983
Full Text :
https://doi.org/10.1109/JPROC.2014.2332154