Abstract | ||
---|---|---|
We emphasize the need to articulate precise, declarative properties in the context of securing Digital ICs. We do this by discussing two pieces of our work on securing Digital ICs. In one, we discuss a seemingly compelling approach to protecting Intellectual Property -- IC camouflaging. We demonstrate that an adversary can carry out a decamouflaging attack, in practice, much more efficiently than previously thought. Underlying our attack is strong foundations: an identification of the computational-complexity of the problems an attacker faces, and how they can be addressed using off-the-shelf constraint solvers. We identify the lack of a precise characterization of \"security\" in this context as an issue. In the other piece of work, we present an example of the articulation of such a security property for 3D IC technology, in the context of securing a supply-chain. The property is articulated declaratively, with explicit assumptions that underlie the threat model. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1145/3060403.3066870 | ACM Great Lakes Symposium on VLSI |
Keywords | Field | DocType |
Declarative properties, Computational complexity | Threat model,Computer security,Computer science,Three-dimensional integrated circuit,Intellectual property,Adversary,Computational complexity theory | Conference |
Citations | PageRank | References |
0 | 0.34 | 8 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mohamed El Massad | 1 | 59 | 3.96 |
Frank Imeson | 2 | 53 | 3.74 |
Siddharth Garg | 3 | 675 | 55.14 |
Mahesh V. Tripunitara | 4 | 558 | 33.06 |