Chip editor: Leveraging circuit edit for logic obfuscation and trusted fabrication
暂无分享,去创建一个
[1] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[2] Ankur Srivastava,et al. Security-Aware Design Flow for 2.5D IC Technology , 2015, TrustED@CCS.
[3] Franz Franchetti,et al. Efficient and secure intellectual property (IP) design with split fabrication , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[4] Y. Greenzweig,et al. Characterization of damage induced by FIB etch and tungsten deposition in high aspect ratio vias , 2011 .
[5] Mark Mohammad Tehranipoor,et al. Efficient and secure split manufacturing via obfuscated built-in self-authentication , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[6] Gang Qu,et al. Hardware metering , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).
[7] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[8] Huimeng Wu,et al. Precise nanofabrication with multiple ion beams for advanced circuit edit , 2014, Microelectron. Reliab..
[9] Paul D. Franzon,et al. FreePDK: An Open-Source Variation-Aware Design Kit , 2007, 2007 IEEE International Conference on Microelectronic Systems Education (MSE'07).
[10] Joseph Zambreno,et al. Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.
[11] Jeyavijayan Rajendran,et al. Logic encryption: A fault analysis perspective , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[12] L. H. Goldstein,et al. SCOAP: Sandia Controllability/Observability Analysis Program , 1980, 17th Design Automation Conference.
[13] Mohamed A. Elgamel,et al. Design methodologies for high-performance noise-tolerant XOR-XNOR circuits , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[14] Rudolf Schlangen,et al. Contact to contacts or silicide by use of backside FIB circuit edit allowing to approach every active circuit node , 2006, Microelectron. Reliab..
[15] Sayak Ray,et al. Evaluating the security of logic encryption algorithms , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[16] Ashish Tiwari,et al. Template-based circuit understanding , 2014, 2014 Formal Methods in Computer-Aided Design (FMCAD).
[17] Tai-Chen Chen,et al. Design-for-debug routing for FIB probing , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[18] John Giacobbe. Physical design for debug: insurance policy for IC's , 2013, ISPD '13.
[19] David Bryan,et al. Combinational profiles of sequential benchmark circuits , 1989, IEEE International Symposium on Circuits and Systems,.
[20] Richard H. Livengood,et al. Application of advanced micromachining techniques for the characterization and debug of high performance microprocessors , 1999 .
[21] Siddharth Garg,et al. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation , 2013, USENIX Security Symposium.
[22] D. Tonneau,et al. Purification and crystallization of tungsten wires fabricated by focused-ion-beam-induced deposition , 2005 .
[23] Giovanni Squillero,et al. RT-Level ITC'99 Benchmarks and First ATPG Results , 2000, IEEE Des. Test Comput..
[24] Mark Mohammad Tehranipoor,et al. Secure Split-Test for preventing IC piracy by untrusted foundry and assembly , 2013, 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS).