This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Ending Piracy of Integrated Circuits
October 2010 (vol. 43 no. 10)
pp. 30-38
Jarrod A. Roy, IBM Corp
Farinaz Koushanfar, Rice University
Igor L. Markov, University of Michigan
An effective technique to combat IC piracy is to render infringement impractical by making physical tampering unprofitable and attacks computationally infeasible. EPIC accomplishes this using a novel low-overhead combinational chip-locking system and a chip-activation protocol based on public-key cryptography.

1. Defense Science Board, "Defense Science Board Task Force on High Performance Microchip Supply," Feb. 2005, US Dept. of Defense; www.acq.osd.mil/dsb/reportsADA435563.pdf .
2. P. Clarke, "Fake NEC Company Found, Says Report," EE Times,4 May 2006; www.eetimes.comshowArticle.jhtml?articleID=187200176 .
3. R.J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, John Wiley & Sons, 2001.
4. F. Koushanfar, G. Qu, and M. Potkonjak, "Intellectual Property Metering," Proc. 4th Int'l Workshop Information Hiding, LNCS 2137, Springer, 2001, pp. 81-95.
5. Y. Su, J. Holleman, and B.P. Otis, "A Digital 1.6pJ/Bit Chip Identification Circuit Using Process Variations," IEEE J. Solid-State Circuits, vol. 43, no. 1, 2008, pp. 69-77.
6. G.E. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," Proc. 44th Ann. Design Automation Conf. (DAC 07), ACM Press, 2007, pp. 9-14.
7. Y. Alkabani and F. Koushanfar, "Active Hardware Metering for Intellectual Property Protection and Security," Proc. 16th Usenix Security Symp. (Security 07), Usenix Assoc., 2007, pp. 291-306.
8. Y. Alkabani, F. Koushanfar, and M. Potkonjak, "Remote Activation of ICs for Piracy Prevention and Digital Rights Management," Proc. Int'l Conf. Computer-Aided Design (ICCAD 07), IEEE Press, 2007, pp. 674-677.
9. U.G. Nawathe et al., "An 8-Core 64-Thread 64b Power-Efficient SPARC SoC (Niagara2)," presentation, IEEE Int'l Solid-State Circuits Conf. (ISSCC 07), Feb. 2007; www.opensparc.net/pubs/preszo/07n2isscc.pdf .
10. G.D. Hachtel and F. Somenzi, Logic Synthesis and Verification Algorithms, Springer, 2006.
11. J.A. Roy, F. Koushanfar, and I.L. Markov, "Extended Abstract: Circuit CAD Tools as a Security Threat," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE Press, 2008, pp. 65-66.
12. D. Lim et al., "Extracting Secret Keys from Integrated Circuits," IEEE Trans. Very Large Scale Integration (VLSI) Systems, vol. 13, no. 10, 2005, pp. 1200-1205.
13. C. Tokunaga, D. Blaauw, and T. Mudge, "True Random Number Generator with a Metastability-Based Quality Control," IEEE J. Solid-State Circuits, vol. 43, no. 1, 2008, pp. 78-85.
1. C. Mouli and W. Carriker, "Future Fab," IEEE Spectrum, Mar. 2007, pp. 38-43.
2. B. Santo, "Plans for Next-Gen Chips Imperiled," IEEE Spectrum, Aug. 2007, pp. 12-14.
1. N. Ferguson and B. Schneier, Practical Cryptography, John Wiley & Sons, 2003.
1. R. Maes et al., "Analysis and Design of Active IC Metering Schemes," Proc. 2009 IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 09), IEEE Press, 2009, pp. 74-81.

Citation:
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov, "Ending Piracy of Integrated Circuits," Computer, vol. 43, no. 10, pp. 30-38, Oct. 2010, doi:10.1109/MC.2010.284
Usage of this product signifies your acceptance of the Terms of Use.