Visible to the public Hardware Design and Verification Techniques for Supply Chain Risk Mitigation

TitleHardware Design and Verification Techniques for Supply Chain Risk Mitigation
Publication TypeConference Paper
Year of Publication2015
AuthorsLiu, B., Jin, Y., Qu, G.
Conference Name2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)
Keywordsconcurrent checking, concurrent engineering, counterfeiting, design automation, Fingerprinting, Foundries, Hardware, IC misusing, IC obfuscation, integrated circuit design, integrated circuits, metering, overbuilding, pubcrawl170112, supply chain management, supply chain security risks mitigation, Supply chains, Watermarking
Abstract

We present a brief survey on the state-of-the-art design and verification techniques: IC obfuscation, watermarking, fingerprinting, metering, concurrent checking and verification, for mitigating supply chain security risks such as IC misusing, counterfeiting and overbuilding.

DOI10.1109/CADGRAPHICS.2015.53
Citation Keyliu_hardware_2015