Special Session: Countering IP Security Threats in Supply Chain
Title | Special Session: Countering IP Security Threats in Supply Chain |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Salmani, Hassan, Hoque, Tamzidul, Bhunia, Swarup, Yasin, Muhammad, Rajendran, Jeyavijayan JV, Karimi, Naghmeh |
Conference Name | 2019 IEEE 37th VLSI Test Symposium (VTS) |
Date Published | apr |
Keywords | Data models, electronic engineering computing, Human Behavior, integrated circuit design, integrated circuit fabrication, integrated circuit manufacture, integrated circuit technology, integrated circuits, Internet, invasive software, IP security threats, learning (artificial intelligence), learning-based trust verification, logic design, logic locking schemes, machine learning, Monitoring, production engineering computing, Protocols, pubcrawl, resilience, Resiliency, reverse engineering, Scalability, supply chain, supply chain management, supply chain security, tagging, telecommunication security, Training, Trojan insertion, Valves |
Abstract | The continuing decrease in feature size of integrated circuits, and the increase of the complexity and cost of design and fabrication has led to outsourcing the design and fabrication of integrated circuits to third parties across the globe, and in turn has introduced several security vulnerabilities. The adversaries in the supply chain can pirate integrated circuits, overproduce these circuits, perform reverse engineering, and/or insert hardware Trojans in these circuits. Developing countermeasures against such security threats is highly crucial. Accordingly, this paper first develops a learning-based trust verification framework to detect hardware Trojans. To tackle Trojan insertion, IP piracy and overproduction, logic locking schemes and in particular stripped functionality logic locking is discussed and its resiliency against the state-of-the-art attacks is investigated. |
URL | https://ieeexplore.ieee.org/document/8758633 |
DOI | 10.1109/VTS.2019.8758633 |
Citation Key | salmani_special_2019 |
- Monitoring
- Valves
- Trojan insertion
- Training
- telecommunication security
- tagging
- supply chain security
- supply chain management
- Supply Chain
- Scalability
- reverse engineering
- Resiliency
- resilience
- pubcrawl
- Protocols
- production engineering computing
- Data models
- machine learning
- logic locking schemes
- logic design
- learning-based trust verification
- learning (artificial intelligence)
- IP security threats
- invasive software
- internet
- integrated circuits
- integrated circuit technology
- integrated circuit manufacture
- integrated circuit fabrication
- integrated circuit design
- Human behavior
- electronic engineering computing