574 research outputs found

    A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL

    Full text link
    Split manufacturing was introduced as an effective countermeasure against hardware-level threats such as IP piracy, overbuilding, and insertion of hardware Trojans. Nevertheless, the security promise of split manufacturing has been challenged by various attacks, which exploit the well-known working principles of physical design tools to infer the missing BEOL interconnects. In this work, we advocate a new paradigm to enhance the security for split manufacturing. Based on Kerckhoff's principle, we protect the FEOL layout in a formal and secure manner, by embedding keys. These keys are purposefully implemented and routed through the BEOL in such a way that they become indecipherable to the state-of-the-art FEOL-centric attacks. We provide our secure physical design flow to the community. We also define the security of split manufacturing formally and provide the associated proofs. At the same time, our technique is competitive with current schemes in terms of layout overhead, especially for practical, large-scale designs (ITC'99 benchmarks).Comment: DATE 2019 (https://www.date-conference.com/conference/session/4.5

    Early cretaceous palynomorphs from the zuata area, eastern Venezuela

    Get PDF
    Este trabalho é baseado em estudos palinológicos e petrográficos do testemunho de um poço (MARAVEN, S. A.) situado na área de Zuata, Venezuela. Os palinomorfos recuperados são atribuídos a 19 gêneros e 33 espécies de esporos e 9 gêneros e 26 espécies de pólen. A idade indicada é, mais provavelmente, ?Aptiano-Albiano médio inferior. São feitas comparações com modelos já estabelecidos de províncias microflorísticas do Cretáceo Inferior (BRENNER, 1976; HERNGREEN, 1976, 1981) e as implicações discutidas. Estudos palinológicos e sedimentológicos sugerem um ambiente de deposição fluvial, sob condições áridas, numa região topograficamente pouco movimentadaThis report is based on palynological and petrographical studies of a core from a Zuata área well (MARAVEN, S. A.). Palynomorphs encountered have been assigned to 19 genera and 33 species of spores and 9 genera and 26 species of pollen grains. The most probable age is ?Aptian-Early Middle Albian. A comparison with previously published Early Cretaceous microfloral province concepts (BRENNER, 1976; HERNGREEN, 1976, 1981) has been made and implications are discussed. Palynological and sedimentological studies suggest a fluvial environment in arid conditions on a flat topograph

    Graph Neural Networks for Hardware Vulnerability Analysis -- Can you Trust your GNN?

    Full text link
    The participation of third-party entities in the globalized semiconductor supply chain introduces potential security vulnerabilities, such as intellectual property piracy and hardware Trojan (HT) insertion. Graph neural networks (GNNs) have been employed to address various hardware security threats, owing to their superior performance on graph-structured data, such as circuits. However, GNNs are also susceptible to attacks. This work examines the use of GNNs for detecting hardware threats like HTs and their vulnerability to attacks. We present BadGNN, a backdoor attack on GNNs that can hide HTs and evade detection with a 100% success rate through minor circuit perturbations. Our findings highlight the need for further investigation into the security and robustness of GNNs before they can be safely used in security-critical applications.Comment: Will be presented at 2023 IEEE VLSI Test Symposium (VTS

    Assembly Sequence Planning Using Neural Network Approach

    Get PDF
    corecore