Making split fabrication synergistically secure and manufacturable
Abstract
References
Recommendations
Making split fabrication synergistically secure and manufacturable
ICCAD '17: Proceedings of the 36th International Conference on Computer-Aided DesignSplit fabrication is a promising approach to security against attacks by untrusted foundries. While existing split fabrication methods consider the overhead of conventional objectives such as wirelength and timing, they mostly neglect manufacturability--...
Making split fabrication synergistically secure and manufacturable
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)Split fabrication is a promising approach to security against attacks by untrusted foundries. While existing split fabrication methods consider the overhead of conventional objectives such as wirelength and timing, they mostly neglect manufacturability &#...
Making split fabrication synergistically secure and manufacturable
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)Split fabrication is a promising approach to security against attacks by untrusted foundries. While existing split fabrication methods consider the overhead of conventional objectives such as wirelength and timing, they mostly neglect manufacturability &#...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
- CEDA: Council on Electronic Design Automation
- SIGDA: ACM Special Interest Group on Design Automation
- IEEE-CAS: Circuits & Systems
In-Cooperation
- IEEE-EDS: Electronic Devices Society
Publisher
IEEE Press
Publication History
Check for updates
Qualifiers
- Research-article
Conference
- CEDA
- SIGDA
- IEEE-CAS
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 24Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in