Advertisement

Hardware Protection through Obfuscation

  • Domenic Forte
  • Swarup Bhunia
  • Mark M. Tehranipoor

Table of contents

  1. Front Matter
    Pages i-xii
  2. Hardware Obfuscation Preliminaries

    1. Front Matter
      Pages 1-1
    2. Bicky Shakya, Mark M. Tehranipoor, Swarup Bhunia, Domenic Forte
      Pages 3-32
    3. Fareena Saqib, Jim Plusquellic
      Pages 33-68
  3. Logic-Based Hardware Obfuscation

    1. Front Matter
      Pages 69-69
    2. Jeyavijayan (JV) Rajendran, Siddharth Garg
      Pages 71-88
    3. Xueyan Wang, Mingze Gao, Qiang Zhou, Yici Cai, Gang Qu
      Pages 89-102
    4. Zimu Guo, Mark M. Tehranipoor, Domenic Forte
      Pages 103-133
    5. Md Tauhidur Rahman, Domenic Forte, Mark M. Tehranipoor
      Pages 135-158
  4. Finite State Machine (FSM) Based Hardware Obfuscation

    1. Front Matter
      Pages 159-159
  5. Hardware Obfuscation Based on Emerging Integration Approaches

    1. Front Matter
      Pages 241-241
    2. Siddharth Garg, Jeyavijayan (JV) Rajendran
      Pages 243-262
    3. Qihang Shi, Kan Xiao, Domenic Forte, Mark M. Tehranipoor
      Pages 263-289
    4. Yang Xie, Chongxi Bao, Ankur Srivastava
      Pages 291-314
  6. Other Hardware Obfuscation Building Blocks

    1. Front Matter
      Pages 315-315
    2. Ujjwal Guin, Mark M. Tehranipoor
      Pages 317-346
  7. Back Matter
    Pages 347-349

About this book

Introduction

This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or “IC Overproduction,” insertion of malicious circuits, referred as “Hardware Trojans”, which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.

Keywords

Counterfeit electronics Integrated circuit authentication Counterfeit integrated circuit Hardware obfuscation Hardware security and trust

Editors and affiliations

  • Domenic Forte
    • 1
  • Swarup Bhunia
    • 2
  • Mark M. Tehranipoor
    • 3
  1. 1.University of FloridaGainsevilleUSA
  2. 2.University of FloridaGainsevilleUSA
  3. 3.University of FloridaGainsevilleUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-49019-9
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-319-49018-2
  • Online ISBN 978-3-319-49019-9
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Engineering