Analysis and design of active IC metering schemes

Roel Maes, Dries Schellekens, Pim Tuyls, Ingrid Verbauwhede

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

29 Citaten (Scopus)

Samenvatting

Outsourcing the fabrication of semiconductor devices to merchant foundries raises some issues concerning the IP protection of the design. Active hardware metering schemes try to counter piracy of integrated circuits by enforcing the fabrication plant to run an activation protocol with the IP owner for every chip that is produced. In this work, we analyze the protocols of two active hardware metering schemes that were recently proposed by Roy et al. in [J.A. Roy et al., 2008]. We study how these schemes achieve security and based on this, we suggest more efficient and secure versions for both. Finally, we present a simplified and secure activation protocol based on physically unclonable functions.
Originele taal-2Engels
Titel2009 IEEE International Workshop on Hardware-Oriented Security and Trust
UitgeverijInstitute of Electrical and Electronics Engineers
Pagina's74-81
Aantal pagina's8
ISBN van geprinte versie978-1-4244-4805-0
DOI's
StatusGepubliceerd - 28 aug. 2009
Extern gepubliceerdJa
Evenement2009 IEEE International Workshop on Hardware-Oriented Security and Trust - San Francisco, Verenigde Staten van Amerika
Duur: 27 jul. 200927 jul. 2009

Congres

Congres2009 IEEE International Workshop on Hardware-Oriented Security and Trust
Land/RegioVerenigde Staten van Amerika
StadSan Francisco
Periode27/07/0927/07/09

Vingerafdruk

Duik in de onderzoeksthema's van 'Analysis and design of active IC metering schemes'. Samen vormen ze een unieke vingerafdruk.

Citeer dit