首页 | 官方网站   微博 | 高级检索  
     


Secure split test techniques to prevent IC piracy for IoT devices
Affiliation:1. Electrical and Computer Engineering, University of Pittsburgh, Pittsburgh, PA, United States;2. Qualcomm Inc.Inc., San Diego, CA, United States;1. CAD Laboratory, Indian Institute of Science, Bangalore 560012, Karnataka, India;2. Morphing Machines Pvt. Ltd., Bangalore 560055, Karnataka, India;1. Division of Electrical and Computer Engineering, Louisiana State University, Baton Rouge, LA 70803, USA;2. Department of Computer Science and Engineering, University of North Texas, Denton, TX 76207, USA;1. Department of Electronics & Computer Engineering, National Institute of Technology Arunachal Pradesh, Yupia 791112, India;2. Department of Electronics & Communication Engineering, National Institute of Technology Agartala, Jirania 799046, India
Abstract:Globalization of semiconductor manufacturing and related activities has led to several security issues like counterfeiting, IP infringement and cloning etc. Counterfeiting not only affects the business and reputation of semiconductor vendor, it will affect the reliability of critical applications. Internet of Things (IoT's) is an emerging application area for semiconductors in which security is a prime concern. Identity or authentication of a device in the network of millions of devices in IoT's is very important. In this paper, we present Secure Split Test with functional testing capability (SSTF) scheme to mitigate the counterfeits coming out from untrusted foundries. The SSTF is suitable for low cost/low end devices. To address the identity management issue in IoT's and counterfeiting of ICs, a Physical Unclonable Function based SSTF (PUF-SSTF) is presented. PUF-SSTF is suitable for ICs targeted to use in smart phones and IoT ‘s. PUF-SSTF is a security solution to address: mitigating the counterfeit ICs coming out from untrusted foundries, identity management in IoT's and licensing the device features, which will benefit the fabless semiconductor vendors for licensing and entitlement management. The proposed SSTF and PUF-SSTF techniques are implemented in both ASIC and FPGA and security analysis is performed. The security analysis results are in par with earlier secure split test techniques like Connecticut Secure Split Test (CSST). The proposed techniques will create the comprehensive secure supply chain solution, which will benefit fabless semiconductor vendor and end-user.
Keywords:Counterfeiting  Secure split test  Identity and authentication in IoT  Hardware metering  Physical unclonable functions
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号