Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2206781.2206806acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
poster

A zero-overhead IC identification technique using clock sweeping and path delay analysis

Published: 03 May 2012 Publication History

Abstract

The counterfeiting of integrated circuits (ICs) has become a major issue for the electronics industry. Counterfeit ICs that find their way into the supply chains of critical applications can have a major impact on the security and reliability of those systems. This paper presents a new method for uniquely identifying ICs through path delay analysis. There is no overhead in terms of area, timing, or power for this method, since it extracts the intrinsic path delay variation information of the IC. Simulation results from 90nm technology and experimental results from 90nm FPGAs demonstrate the effectiveness of our technique.

References

[1]
H. Livingston, "Avoiding counterfeit electronic components," Components and Packaging Technologies, IEEE Transactions on, vol. 30, pp. 187--189, march 2007.
[2]
M. Tehranipoor and C. Wang, Introduction to Hardware Security and Trust. Springer, 2012.
[3]
J. Stradley and D. Karraker, "The electronic part supply chain and risks of counterfeit parts in defense applications," Components and Packaging Technologies, IEEE Transactions on, vol. 29, pp. 703--705, sept. 2006.
[4]
K. Lofstrom, W. Daasch, and D. Taylor, "Ic identification circuit using device mismatch," in Solid-State Circuits Conference, 2000. Digest of Technical Papers. ISSCC. 2000 IEEE International, pp. 372--373, 2000.
[5]
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical random functions," in Proceedings of the 9th ACM conference on Computer and communications security, CCS '02, (New York, NY, USA), pp. 148--160, ACM, 2002.
[6]
G. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Design Automation Conference, 2007. DAC '07. 44th ACM/IEEE, pp. 9 --14, june 2007.
[7]
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, "Fpga intrinsic pufs and their use for ip protection," in Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, CHES '07, (Berlin, Heidelberg), pp. 63--80, Springer-Verlag, 2007.
[8]
F. Koushanfar and G. Qu, "Hardware metering," in Design Automation Conference, 2001. Proceedings, pp. 490 -- 493, 2001.
[9]
Y. M. Alkabani and F. Koushanfar, "Active hardware metering for intellectual property protection and security," in Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, (Berkeley, CA, USA), pp. 20:1--20:16, USENIX Association, 2007.
[10]
Y. Alkabani, F. Koushanfar, N. Kiyavash, and M. Potkonjak, "Information hiding," ch. Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach, pp. 102--117, Berlin, Heidelberg: Springer-Verlag, 2008.

Cited By

View all
  • (2024)PowerID: Using Supply-Side Impedances of Power Delivery Networks as Signatures for Consumer ElectronicsIEEE Transactions on Consumer Electronics10.1109/TCE.2023.333766870:1(378-388)Online publication date: Feb-2024
  • (2023)Hardware Trojan Detection Using Machine Learning: A TutorialACM Transactions on Embedded Computing Systems10.1145/357982322:3(1-26)Online publication date: 18-Jan-2023
  • (2020)Security Assessment of High-Level SynthesisEmerging Topics in Hardware Security10.1007/978-3-030-64448-2_6(147-170)Online publication date: 10-Nov-2020
  • Show More Cited By

Index Terms

  1. A zero-overhead IC identification technique using clock sweeping and path delay analysis

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GLSVLSI '12: Proceedings of the great lakes symposium on VLSI
    May 2012
    388 pages
    ISBN:9781450312448
    DOI:10.1145/2206781
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 May 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IC identification
    2. clock sweeping
    3. counterfeit ICs
    4. path delay analysis
    5. process variations

    Qualifiers

    • Poster

    Conference

    GLSVLSI '12
    Sponsor:
    GLSVLSI '12: Great Lakes Symposium on VLSI 2012
    May 3 - 4, 2012
    Utah, Salt Lake City, USA

    Acceptance Rates

    Overall Acceptance Rate 312 of 1,156 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)PowerID: Using Supply-Side Impedances of Power Delivery Networks as Signatures for Consumer ElectronicsIEEE Transactions on Consumer Electronics10.1109/TCE.2023.333766870:1(378-388)Online publication date: Feb-2024
    • (2023)Hardware Trojan Detection Using Machine Learning: A TutorialACM Transactions on Embedded Computing Systems10.1145/357982322:3(1-26)Online publication date: 18-Jan-2023
    • (2020)Security Assessment of High-Level SynthesisEmerging Topics in Hardware Security10.1007/978-3-030-64448-2_6(147-170)Online publication date: 10-Nov-2020
    • (2019)Electronics Supply ChainHardware Security10.1016/B978-0-12-812477-2.00011-3(141-169)Online publication date: 2019
    • (2016)Circuit Timing Signature (CTS) for Detection of Counterfeit Integrated CircuitsSecure System Design and Trustable Computing10.1007/978-3-319-14971-4_6(211-239)Online publication date: 2016
    • (2016)Design and Implementation of High-Quality Physical Unclonable Functions for Hardware-Oriented CryptographySecure System Design and Trustable Computing10.1007/978-3-319-14971-4_2(39-81)Online publication date: 2016
    • (2015)Advanced Detection: Electrical TestsCounterfeit Integrated Circuits10.1007/978-3-319-11824-6_8(157-174)Online publication date: 21-Jan-2015
    • (2014)Bit selection algorithm suitable for high-volume production of SRAM-PUF2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)10.1109/HST.2014.6855578(101-106)Online publication date: May-2014

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media