Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3060403.3060471acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

Leveraging All-Spin Logic to Improve Hardware Security

Published: 10 May 2017 Publication History

Abstract

Due to the globalization of Integrated Circuit (IC) design in the semiconductor industry and the outsourcing of chip manufacturing, third Party Intellectual Properties (3PIPs) become vulnerable to IP piracy, reverse engineering, counterfeit IC, and hardware trojans. A designer has to employ a strong technique to thwart such attacks, e.g. using Strong Logic Locking method [1]. But, such technique cannot be used to protect some circuits since the inserted key-gates rely on the topology of the circuit. Also, it requires higher power, delay, and area overheads compared to other techniques. In this paper, we present the use of spintronic devices to help protect ICs with less performance overhead. We then evaluate the proposed design based on security metric and performance overhead. One of the best spintronic device candidates is the All Spin Logic due to its unique properties: small area, no spin-charge signal conversion, and its compatibility with conventional CMOS technology.

References

[1]
M. Yasin et al. On improving the security of logic locking. IEEE Trans. CAD, 2015.
[2]
J. Rajendran et al. Regaining trust in vlsi design: Design-for-trust techniques. Proceedings of the IEEE, 2014.
[3]
X. Fong et al. Spin-transfer torque devices for logic and memory: Prospects and perspectives. IEEE Trans. CAD, 2016.
[4]
H. Dery et al. Spin-based logic in semiconductors for reconfigurable large-scale circuits. Nature, 447:573--376, 2007.
[5]
B. Behin-Aein et al. Proposal for an all-spin logic device with built-in memory. Nature, 5:266--270, 2010.
[6]
C. Augustine et al. Low-power functionality enhanced computation architecture using spin-based devices. In IEEE/ACM International Symposium on NANOARCH, 2011.
[7]
Kerem Camsari, Samiran Ganguly, and Supriyo Datta. Modular approach to spintronics. In 2015 Scientific Reports, volume 5.
[8]
Mrigank Sharad et al. Ultra-high density, high-performance and energy-efficient all spin logic. Cornell University Library, 2013.
[9]
A. Stoica et al. Taking evolutionary circuit design from experimentation to implementation: some useful techniques and a silicon demonstration. IEE P-COMPUT DIG T, 2004.
[10]
J. Kim et al. Spin-based computing: Device concepts, current status, and a case study on a high-performance microprocessor. Proceedings of the IEEE, 2015.
[11]
P. Subramanyan et al. Evaluating the security of logic encryption algorithms. In IEEE International Symposium on HOST, 2015.
[12]
Shoun Matsunaga et al. Fabrication of a nonvolatile full adder based on logic-in-memory architecture using magnetic tunnel junctions. Applied Physics Express, 1(9):091301, 2008.
[13]
K. Huang et al. Magnetic domain-wall racetrack memory-based nonvolatile logic for low-power computing and fast run-time-reconfiguration. IEEE Trans on VLSI Systems, 2016.

Cited By

View all
  • (2024)A novel crosstalk based dynamic camouflage technique for preventing reverse engineeringIEICE Electronics Express10.1587/elex.21.2024016521:10(20240165-20240165)Online publication date: 25-May-2024
  • (2024)Advances in Logic LockingHardware Security10.1007/978-3-031-58687-3_2(53-142)Online publication date: 3-Apr-2024
  • (2023)Polymorphic Hybrid CMOS-MTJ Logic Gates for Hardware Security ApplicationsElectronics10.3390/electronics1204090212:4(902)Online publication date: 10-Feb-2023
  • Show More Cited By

Index Terms

  1. Leveraging All-Spin Logic to Improve Hardware Security

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GLSVLSI '17: Proceedings of the Great Lakes Symposium on VLSI 2017
    May 2017
    516 pages
    ISBN:9781450349727
    DOI:10.1145/3060403
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 May 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. asl.
    2. ic protection
    3. ip piracy
    4. logic encryption
    5. spintronic device

    Qualifiers

    • Research-article

    Conference

    GLSVLSI '17
    Sponsor:
    GLSVLSI '17: Great Lakes Symposium on VLSI 2017
    May 10 - 12, 2017
    Alberta, Banff, Canada

    Acceptance Rates

    GLSVLSI '17 Paper Acceptance Rate 48 of 197 submissions, 24%;
    Overall Acceptance Rate 312 of 1,156 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)14
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 04 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A novel crosstalk based dynamic camouflage technique for preventing reverse engineeringIEICE Electronics Express10.1587/elex.21.2024016521:10(20240165-20240165)Online publication date: 25-May-2024
    • (2024)Advances in Logic LockingHardware Security10.1007/978-3-031-58687-3_2(53-142)Online publication date: 3-Apr-2024
    • (2023)Polymorphic Hybrid CMOS-MTJ Logic Gates for Hardware Security ApplicationsElectronics10.3390/electronics1204090212:4(902)Online publication date: 10-Feb-2023
    • (2023)Arm PSA-Certified IoT Chip Security: A Case StudyTsinghua Science and Technology10.26599/TST.2021.901009428:2(244-257)Online publication date: Apr-2023
    • (2022)Physically and Algorithmically Secure Logic Locking with Hybrid CMOS/Nanomagnet Logic Circuits2022 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE54114.2022.9774629(17-22)Online publication date: 14-Mar-2022
    • (2022) Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices IEEE Transactions on Emerging Topics in Computing10.1109/TETC.2020.299113410:1(137-156)Online publication date: 1-Jan-2022
    • (2021)Resilient and Secure Hardware Devices Using ASLACM Journal on Emerging Technologies in Computing Systems10.1145/342998217:2(1-26)Online publication date: 6-Jan-2021
    • (2021)Secure Logic Locking with Strain-Protected Nanomagnet Logic2021 58th ACM/IEEE Design Automation Conference (DAC)10.1109/DAC18074.2021.9586258(127-132)Online publication date: 5-Dec-2021
    • (2020)Strong Logic Obfuscation with Low Overhead against IC Reverse Engineering AttacksACM Transactions on Design Automation of Electronic Systems10.1145/339801225:4(1-31)Online publication date: 8-Jun-2020
    • (2020)Hardware Security in Spin-based Computing-in-memoryACM Journal on Emerging Technologies in Computing Systems10.1145/339751316:4(1-18)Online publication date: 27-Aug-2020
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media