Contact-less Integrity Verification of Microelectronics Using Near-Field EM Analysis

نویسندگان

چکیده

Modern microelectronics life-cycle and supply chain ecosystem bring multiple untrusted entities, which can compromise their integrity. A major integrity issue of stems from piracy intellectual properties (IP) counterfeiting, causes significant revenue loss to the semiconductor manufacturers. Further, these components often lead compromised functionality, reliability, security, safety an electronic system. This paper presents secure information transmission probing methods for verifying digital integrated circuit (ICs) based on electromagnetic (EM) near-field emissions thereby protecting systems against counterfeit components. The proposed method has been tested both high-level instructions executed by microprocessors or Systems-on-Chip (serving as examples software), also logic circuits within FPGA fabrics ASICs hardware). authentication required each system is generated using a pseudo-random number generator securely transmitted via magnetic emissions. authorized party probe probe, process acquired signals improve signal-to-noise ratio (SNR), then recover through matched filtering. Experimental results commercial SoCs are used demonstrate technique. Methods reducing EM interference during verification FPGAs described.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

analysis of ruin probability for insurance companies using markov chain

در این پایان نامه نشان داده ایم که چگونه می توان مدل ریسک بیمه ای اسپیرر اندرسون را به کمک زنجیره های مارکوف تعریف کرد. سپس به کمک روش های آنالیز ماتریسی احتمال برشکستگی ، میزان مازاد در هنگام برشکستگی و میزان کسری بودجه در زمان وقوع برشکستگی را محاسبه کرده ایم. هدف ما در این پایان نامه بسیار محاسباتی و کاربردی تر از روش های است که در گذشته برای محاسبه این احتمال ارائه شده است. در ابتدا ما نشا...

15 صفحه اول

Maximum Likelihood 3-D Near-Field Source Localization Using the EM Algorithm

In this paper, maximum likelihood estimator is proposed for passive localization of narrowband sources in the spherical coordinates (azimuth, elevation, and range). We adapt Expectation/Maximization iterative method to solve the complicated multi-parameter optimization problem appearing on the 3-D localization problem. The proposed algorithm is based on maximum likelihood criterion which employ...

متن کامل

Framework for Multi-Cloud Using Integrity Verification Using CPDP Scheme

Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We prese...

متن کامل

Near-field distribution in light-coupling masks for contact lithography

We discuss the potential and limitations of light-coupling masks for high-resolution subwavelength optical lithography. Using a three-dimensional fully vectorial numerical approach based on Green’s tensor technique, the near-field distribution of the electric field in the photoresist is calculated. We study the dependence of the illuminating light and the angle of incidence on polarization. Fur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3300222