SALWARE: Salutary Hardware to design Trusted IC

نویسندگان

  • Lilian Bossuet
  • David Hely
چکیده

Fabless semiconductor industries are facing the rise of design costs of integrated circuits. This rise is link to the technology change and the complexity increasing. It follows that integrated circuits have become targets of counterfeiting and theft. The SALWARE project aims to study (theoretically and experimentally) salutary hardware design in order to fight against theft, illegal cloning and counterfeiting of integrated circuits. Salutary hardware means an embedded hardware system, hardly detectable / circumvented, inserted in an integrated circuit or a virtual component (Intellectual Property), used to provide intellectual property information (eg watermarking or hardware license) and / or to remotely activate the circuit or IP after manufacture and during use.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Trojan Detection Solutions and Design - for - Trust Challenges

computer 64 Published by the IEEE Computer Society 0018-9162/11/$26.00 © 2011 IEEE a trusted design center and foundry, it is expensive and economically infeasible given current trends in the globalization of IC design and fabrication. On the other hand, verifying trustworthiness requires a postmanufacturing step to validate conformance of the fabricated IC to the original functional and perfor...

متن کامل

ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

متن کامل

Detection of Malicious Insertions in Hardware through an Integrative Validation Approach

Integrated Circuit (IC) manufacturing has become an increasingly global process, which leads to the growing threat of hardware Trojan attacks. In the absence of a trusted supply chain model, post-manufacturing detection of hardware Trojans has gained relevance in commercial and military applications, where trusted field operation is critical. In a distributed manufacturing chain, there are seve...

متن کامل

Trusted Hardware for Partitioned Multicore

This paper aims to give a comprehensive design of the trusted hardware layer for a partitioned multicore processor. We start our design with the Trusted Platform Module (TPM) and propose changes to the TPM architecture that are necessary for a partitioned multicore processor. We propose several security measures to make the system secure against plausible known attacks. We analyze the system im...

متن کامل

Exploring Trusted Networking for Protected Applications

In modern computing systems, networking is critical. In the context of trusted application environments, building a trusted networking interface remains an open question. In this paper, we categorize the networking needs of trusted applications into three modes: Local Equivalent, Trusted Local Networks and Internet-Wide Trusted Networking. Collectively these modes enable trusted applications to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013