1. Security-Aware 2.5D Integrated Circuit Design Flow Against Hardware IP Piracy
- Author
-
Ankur Srivastava, Chongxi Bao, and Yang Xie
- Subjects
General Computer Science ,business.industry ,Computer science ,0211 other engineering and technologies ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,02 engineering and technology ,Integrated circuit ,Integrated circuit design ,Computer security ,computer.software_genre ,020202 computer hardware & architecture ,law.invention ,law ,Embedded system ,Logic gate ,Hardware_INTEGRATEDCIRCUITS ,0202 electrical engineering, electronic engineering, information engineering ,Interposer ,Physical design ,business ,computer ,021106 design practice & management - Abstract
To combat security threats to integrated circuit (IC) fabrication outsourcing, 2.5D integration can obfuscate the outsourced design by lifting a portion of the wires into an interposer layer. A security-aware physical design flow for 2.5D IC technology can then help defend against attacks by increasing the layout and functionality obfuscation.
- Published
- 2017
- Full Text
- View/download PDF