Author:
Aitchison Callum,Halak Basel,Serb Alex,Prodromakis Themis
Abstract
AbstractThe modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To this end, it is necessary to be able to uniquely identify systems to aid in supply chain tracking and quality assurance. Many identifiers, however, can be cloned onto counterfeit devices and are therefore untrustworthy. This paper proposes a methodology for using post-CMOS memristor devices as a fingerprint to uniquely identify ICs. To achieve this, memristors’ unique and variable I–V characteristics are exploited to produce a fingerprint that can be generally applicable to a wide variety of different memristor technologies and identifiable over time, even where cell retention is non-ideal. In doing so it aims to minimise the hardware required on-chip both to minimise cost and maximise the auditability of the system. The methodology is applied to a $$\text {TiO}_x$$
TiO
x
memristor technology, and shown to be able to identify cells in a set.
Funder
UK Research and Innovation
Royal Academy of Engineering
Publisher
Springer Science and Business Media LLC
Reference30 articles.
1. Borza, M.: What are counterfeit chips? Everything you need to know. Synopsys, Inc. (2021). https://blogs.synopsys.com/from-silicon-to-software/2021/11/02/what-are-counterfeit-chips/
2. Koushanfar, F., Hong, I. & Potkonjak, M. Behavioral synthesis techniques for intellectual property protection. ACM Trans. Des. Autom. Electron. Syst. 10(3), 523–545. https://doi.org/10.1145/1080334.1080338 (2005).
3. Charbon, E.: Hierarchical watermarking in ic design. In: Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No. 98CH36143), 295–298 (1998). https://doi.org/10.1109/CICC.1998.694985
4. Gao, Y., Al-Sarawi, S. F. & Abbott, D. Physical unclonable functions. Nat. Electron. 3(2), 81–91. https://doi.org/10.1038/s41928-020-0372-5 (2020).
5. Yilmaz, Y., Do, V.-H. & Halak, B. Armor: An anti-counterfeit security mechanism for low cost radio frequency identification systems. IEEE Trans. Emerg. Top. Comput. 9(4), 2125–2138. https://doi.org/10.1109/TETC.2020.2964435 (2021).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献