skip to main content
10.1145/2966986.2966992guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

A machine learning approach to fab-of-origin attestation

Authors Info & Claims
Published:07 November 2016Publication History

ABSTRACT

We introduce a machine learning approach for distinguishing between integrated circuits fabricated in a ratified facility and circuits originating from an unknown or undesired source based on parametric measurements. Unlike earlier approaches, which seek to achieve the same objective in a general, design-independent manner, the proposed method leverages the interaction between the idiosyncrasies of the fabrication facility and a specific design, in order to create a customized fab-of-origin membership test for the circuit in question. Effectiveness of the proposed method is demonstrated using two large industrial datasets from a 65nm Texas Instruments RF transceiver manufactured in two different fabrication facilities.

References

  1. [1].Anderson T. W. et al., “Asymptotic theory of certain “goodness of fit” criteria based on stochastic processes”, The annals of mathematical statistics, pp. 193212, 1952.Google ScholarGoogle Scholar
  2. [2].Bhunia S. et al., “Hardware trojan attacks: Threat analysis and countermeasures”, Proceedings of the IEEE, vol. 102, no. 8, pp. 12291247, 2014.Google ScholarGoogle Scholar
  3. [3].Bloom G. et al., “Fab forensics: Increasing trust in IC fabrication”, in Proc. IEEE HST, 2010, pp. 99105.Google ScholarGoogle Scholar
  4. [4].DARPA. SB133–003: Electronic component fingerprinting to determine manufacturing origin. [Online]. Available: http://www.acq.osd.mil/osbp/sbir/solicitations/sbir20133/darpa133.htmGoogle ScholarGoogle Scholar
  5. [5].Guin U. et al., “Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain”, Proceedings of the IEEE, vol. 102, no. 8, pp. 12071228, Aug 2014.Google ScholarGoogle Scholar
  6. [6].Hinton G. E. et al., “A fast learning algorithm for deep belief nets”, Neural computation, vol. 18, no. 7, pp. 15271554, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7].Holcomb D. E. et al., “Power-up SRAM state as an identifying fingerprintand source of true random numbers”, Trans. Computers, vol. 58, no. 9, pp. 11981210, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8].Huang K. et al., “Recycled IC detection based on statistical methods”, Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 6, pp. 947960, June 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9].Jolliffe I., Principal component analysis. Wiley Online Library 2002.Google ScholarGoogle Scholar
  10. [10].Manevitz L. M. et al., “One-class SVMs for document classification”, The Journal of machine Learning research, vol. 2, pp. 139154, 2002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11].Potkonjak M. et al., “Differential public physically unclonable functions: architecture and applications”, in Proc. ACM DAC, 2011, pp. 242247.Google ScholarGoogle Scholar
  12. [12].Silverman B. W., Density estimation for statistics and data analysis. CRC press 1986, vol. 26.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13].Tehranipoor M. et al., “A survey of hardware trojan taxonomy and detection”, IEEE Design and Test of Computers, vol. 27, no. 1, pp. 1025, Jan 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14].Tibshirani R. et al., “Estimating the number of clusters in a data set via the gap statistic”, Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol. 63, no. 2, pp. 411423, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15].Van der Maaten L. et al., “Visualizing data using t-SNE”, Journal of Machine Learning Research, vol. 9, no. 2579–2605, p. 85, 2008.Google ScholarGoogle Scholar
  16. [16].Wendt J. B. et al., “Techniques for foundry identification”, in Proc. ACM DAC, 2014, pp. 16.Google ScholarGoogle Scholar

Index Terms

  1. A machine learning approach to fab-of-origin attestation
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image Guide Proceedings
          2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
          Nov 2016
          946 pages

          Copyright © 2016

          Publisher

          IEEE Press

          Publication History

          • Published: 7 November 2016

          Permissions

          Request permissions about this article.

          Request Permissions

          Qualifiers

          • research-article