Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Ending Piracy of Integrated Circuits

Published: 01 October 2010 Publication History

Abstract

An effective technique to combat IC piracy is to render infringement impractical by making physical tampering unprofitable and attacks computationally infeasible. EPIC accomplishes this using a novel low-overhead combinational chip-locking system and a chip-activation protocol based on public-key cryptography.

Cited By

View all
  • (2024)GateLock: Input-Dependent Key-Based Locked Gates for SAT Resistant Logic LockingIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2023.334035032:2(361-371)Online publication date: 1-Feb-2024
  • (2024)Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation: An ExplorationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335728619(2771-2785)Online publication date: 1-Jan-2024
  • (2024)LOOPLock 3.0: A Robust Cyclic Logic Locking ApproachProceedings of the 29th Asia and South Pacific Design Automation Conference10.1109/ASP-DAC58780.2024.10473877(594-599)Online publication date: 22-Jan-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computer
Computer  Volume 43, Issue 10
October 2010
83 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 October 2010

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)GateLock: Input-Dependent Key-Based Locked Gates for SAT Resistant Logic LockingIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2023.334035032:2(361-371)Online publication date: 1-Feb-2024
  • (2024)Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation: An ExplorationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335728619(2771-2785)Online publication date: 1-Jan-2024
  • (2024)LOOPLock 3.0: A Robust Cyclic Logic Locking ApproachProceedings of the 29th Asia and South Pacific Design Automation Conference10.1109/ASP-DAC58780.2024.10473877(594-599)Online publication date: 22-Jan-2024
  • (2023)TimingCamouflage+ DecamouflagedProceedings of the Great Lakes Symposium on VLSI 202310.1145/3583781.3590238(575-580)Online publication date: 5-Jun-2023
  • (2023)Leaking Wireless ICs via Hardware Trojan-Infected SynchronizationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.321850720:5(3845-3859)Online publication date: 31-Aug-2023
  • (2023)On the Security of Sequential Logic Locking Against Oracle-Guided AttacksIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.325342842:11(3628-3641)Online publication date: 1-Nov-2023
  • (2023)HLock+: A Robust and Low-Overhead Logic Locking at the High-Level LanguageIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2022.321579642:7(2149-2162)Online publication date: 1-Jul-2023
  • (2023)Redundancy Attack: Breaking Logic Locking Through Oracleless Rationality AnalysisIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2022.319279342:4(1044-1057)Online publication date: 1-Apr-2023
  • (2023)Design of INV/BUFF Logic Locking For Enhancing the Hardware SecurityJournal of Electronic Testing: Theory and Applications10.1007/s10836-023-06061-y39:2(141-153)Online publication date: 5-May-2023
  • (2022)Leveraging Layout-based Effects for Locking Analog ICsProceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security10.1145/3560834.3563826(5-13)Online publication date: 11-Nov-2022
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media