The Community for Technology Leaders
RSS Icon
Issue No.10 - October (2010 vol.43)
pp: 30-38
Jarrod A. Roy , IBM Corp
Igor L. Markov , University of Michigan
An effective technique to combat IC piracy is to render infringement impractical by making physical tampering unprofitable and attacks computationally infeasible. EPIC accomplishes this using a novel low-overhead combinational chip-locking system and a chip-activation protocol based on public-key cryptography.
Jarrod A. Roy, Igor L. Markov, "Ending Piracy of Integrated Circuits", Computer, vol.43, no. 10, pp. 30-38, October 2010, doi:10.1109/MC.2010.284
1. Defense Science Board, "Defense Science Board Task Force on High Performance Microchip Supply," Feb. 2005, US Dept. of Defense; .
2. P. Clarke, "Fake NEC Company Found, Says Report," EE Times,4 May 2006; www.eetimes.comshowArticle.jhtml?articleID=187200176 .
3. R.J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, John Wiley & Sons, 2001.
4. F. Koushanfar, G. Qu, and M. Potkonjak, "Intellectual Property Metering," Proc. 4th Int'l Workshop Information Hiding, LNCS 2137, Springer, 2001, pp. 81-95.
5. Y. Su, J. Holleman, and B.P. Otis, "A Digital 1.6pJ/Bit Chip Identification Circuit Using Process Variations," IEEE J. Solid-State Circuits, vol. 43, no. 1, 2008, pp. 69-77.
6. G.E. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," Proc. 44th Ann. Design Automation Conf. (DAC 07), ACM Press, 2007, pp. 9-14.
7. Y. Alkabani and F. Koushanfar, "Active Hardware Metering for Intellectual Property Protection and Security," Proc. 16th Usenix Security Symp. (Security 07), Usenix Assoc., 2007, pp. 291-306.
8. Y. Alkabani, F. Koushanfar, and M. Potkonjak, "Remote Activation of ICs for Piracy Prevention and Digital Rights Management," Proc. Int'l Conf. Computer-Aided Design (ICCAD 07), IEEE Press, 2007, pp. 674-677.
9. U.G. Nawathe et al., "An 8-Core 64-Thread 64b Power-Efficient SPARC SoC (Niagara2)," presentation, IEEE Int'l Solid-State Circuits Conf. (ISSCC 07), Feb. 2007; .
10. G.D. Hachtel and F. Somenzi, Logic Synthesis and Verification Algorithms, Springer, 2006.
11. J.A. Roy, F. Koushanfar, and I.L. Markov, "Extended Abstract: Circuit CAD Tools as a Security Threat," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 08), IEEE Press, 2008, pp. 65-66.
12. D. Lim et al., "Extracting Secret Keys from Integrated Circuits," IEEE Trans. Very Large Scale Integration (VLSI) Systems, vol. 13, no. 10, 2005, pp. 1200-1205.
13. C. Tokunaga, D. Blaauw, and T. Mudge, "True Random Number Generator with a Metastability-Based Quality Control," IEEE J. Solid-State Circuits, vol. 43, no. 1, 2008, pp. 78-85.
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool