Analysis and design of active IC metering schemes

Roel Maes, Dries Schellekens, Pim Tuyls, Ingrid Verbauwhede

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

29 Citations (Scopus)

Abstract

Outsourcing the fabrication of semiconductor devices to merchant foundries raises some issues concerning the IP protection of the design. Active hardware metering schemes try to counter piracy of integrated circuits by enforcing the fabrication plant to run an activation protocol with the IP owner for every chip that is produced. In this work, we analyze the protocols of two active hardware metering schemes that were recently proposed by Roy et al. in [J.A. Roy et al., 2008]. We study how these schemes achieve security and based on this, we suggest more efficient and secure versions for both. Finally, we present a simplified and secure activation protocol based on physically unclonable functions.
Original languageEnglish
Title of host publication2009 IEEE International Workshop on Hardware-Oriented Security and Trust
PublisherInstitute of Electrical and Electronics Engineers
Pages74-81
Number of pages8
ISBN (Print)978-1-4244-4805-0
DOIs
Publication statusPublished - 28 Aug 2009
Externally publishedYes
Event2009 IEEE International Workshop on Hardware-Oriented Security and Trust - San Francisco, United States
Duration: 27 Jul 200927 Jul 2009

Conference

Conference2009 IEEE International Workshop on Hardware-Oriented Security and Trust
Country/TerritoryUnited States
CitySan Francisco
Period27/07/0927/07/09

Keywords

  • Field programmable gate arrays
  • Protocols
  • Production
  • Hardware
  • Costs
  • Foundries
  • Manufacturing
  • Cloning
  • Fabrication
  • Protection

Fingerprint

Dive into the research topics of 'Analysis and design of active IC metering schemes'. Together they form a unique fingerprint.

Cite this