Overview
Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.
Read the articleAUTHOR
-
Lilian BOSSUET: University Professor - Hubert Curien Laboratory, CNRS UMR5516, University of Lyon
INTRODUCTION
In recent years, the microelectronics industry has been faced with a considerable increase in cases of counterfeiting, theft and illegal copying of integrated circuits. Globally, counterfeiting is estimated to account for 7-10% of the global semiconductor market , and affects all electronic components and integrated circuits manufactured worldwide, representing a colossal economic loss for the legal industry and tens of thousands of lost jobs. Over and above the economic and social aspects, counterfeit integrated circuits also pose a serious problem of confidence for electronic and microelectronic equipment embedded in complex systems, particularly for sensitive applications such as the military and aerospace sectors. It is therefore strategic for the microelectronics industry to protect the intellectual property of IC designers, as well as the supply chain of their customers.
This article presents the main threats to the intellectual property of integrated circuit and virtual component (IP) designers, placing them within the product lifecycle of the microelectronics industry. It also presents the main counterfeit detection strategies and methods commonly used to secure supply chains. But counterfeit detection is not enough, as it does not cover all threats such as over-manufacturing, reverse engineering and cloning. Protection strategies and methods must be devised as early as possible by the designer to limit the risks to his intellectual property. The designer needs to devise and insert into the hardware systems that will effectively combat theft, illegal copying and counterfeiting of integrated circuits. By the term "salutary hardware" or "salware" we mean a hardware system, difficult to detect/control, inserted into an integrated circuit and used to provide intellectual property information (e.g. trademark or user license) and/or to remotely activate the circuit after manufacture and during use. This is the subject of this article. Readers will find a list of acronyms at the end of the article.
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Combating the theft, copying and counterfeiting of integrated circuits
Bibliography
Software tools
PUFmeter, [Software], PUF statistical analysis tool, Trust-Hub, University of Florida, USA – http://trust-hub.org/software
Websites
Website of the ANR SALWARE project led by the Laboratoire Hubert Curien of the CNRS and the University of Lyon, aimed at combating counterfeiting, theft and copying of integrated electronic circuits and IP: https://perso.univ-st-etienne.fr/bl16388h/salware/
Website of the European H2020 HECTOR project, which...
Directory
Manufacturers – Suppliers – Distributors (non-exhaustive list)
Algodone offers a PUF-based hardware licensing solution to protect IPs and integrated circuits against copying and counterfeiting.
BATTELLE offers a solution for detecting counterfeit integrated circuits by fingerprinting power...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference