{"title":"标题页","authors":"M. Kneževi","doi":"10.13109/9783666101458.front","DOIUrl":null,"url":null,"abstract":"Hardware security relies on the difficulty of reverse engineering to protect critical information. While virtually anything can be reverse engineered given enough time and money, the question usually is: “is it worth it?” The intellectual property industry uses reverse engineering to drive innovation, to protect patented inventions, and to enforce copyright and trade secret rights. Intellectual property transactions, licensing, and litigation, relies on technical information to drive the patent assertion and monetization process. Others use reverse engineering for more nefarious purposes. The cost and potential benefit of a reverse engineering approach must be considered before embarking on a complex project. The continuous scaling of the complexity and level of integration of semiconductor devices and systems presents major challenges to the analysis of the technological principles of a system. Hardware encryption and software embedded in integrated circuits, together with hardware and software obfuscation techniques add additional layers of difficulty to the analysis. Today, very sophisticated techniques are used to analyze the function, structure and operation of integrated circuits and systems. This presentation gives examples of state-of-the-art reverse engineering techniques for hardware and software system analysis, transistor level-to-schematic circuit extraction, and semiconductor fabrication process analysis. The presentation concludes with a discussion of some of the best practices in system design that can be used to create substantial barriers to the success of a reverse engineering attack. Biography Dr. Adams joined TAEUS International Corporation in 1993. He has over thirty years experience in managing the definition, development, and transfer of new products and technologies. Dr. Adams has held senior engineering and management positions with Sandia National Laboratories, INMOS, Monolithic Memories, United Technologies, and TAEUS, and has served as an expert witness in copyright, trade secret, and patent infringement cases. His expertise includes strategic planning and program management, patent evaluation and analysis, forensic engineering, process integration, device physics, microelectronic reliability and failure analysis, electronic materials, semiconductor memories and microprocessors, software, management of quality, and radiation effects in microelectronics. Dr. Adams holds three patents in integrated circuit technology. He is listed in Who’s Who in Technology Today, 1984–1995 and has received the TOBIE Award for most significant R&D","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2010-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Title pages\",\"authors\":\"M. Kneževi\",\"doi\":\"10.13109/9783666101458.front\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Hardware security relies on the difficulty of reverse engineering to protect critical information. While virtually anything can be reverse engineered given enough time and money, the question usually is: “is it worth it?” The intellectual property industry uses reverse engineering to drive innovation, to protect patented inventions, and to enforce copyright and trade secret rights. Intellectual property transactions, licensing, and litigation, relies on technical information to drive the patent assertion and monetization process. Others use reverse engineering for more nefarious purposes. The cost and potential benefit of a reverse engineering approach must be considered before embarking on a complex project. The continuous scaling of the complexity and level of integration of semiconductor devices and systems presents major challenges to the analysis of the technological principles of a system. Hardware encryption and software embedded in integrated circuits, together with hardware and software obfuscation techniques add additional layers of difficulty to the analysis. Today, very sophisticated techniques are used to analyze the function, structure and operation of integrated circuits and systems. This presentation gives examples of state-of-the-art reverse engineering techniques for hardware and software system analysis, transistor level-to-schematic circuit extraction, and semiconductor fabrication process analysis. The presentation concludes with a discussion of some of the best practices in system design that can be used to create substantial barriers to the success of a reverse engineering attack. Biography Dr. Adams joined TAEUS International Corporation in 1993. He has over thirty years experience in managing the definition, development, and transfer of new products and technologies. Dr. Adams has held senior engineering and management positions with Sandia National Laboratories, INMOS, Monolithic Memories, United Technologies, and TAEUS, and has served as an expert witness in copyright, trade secret, and patent infringement cases. His expertise includes strategic planning and program management, patent evaluation and analysis, forensic engineering, process integration, device physics, microelectronic reliability and failure analysis, electronic materials, semiconductor memories and microprocessors, software, management of quality, and radiation effects in microelectronics. Dr. Adams holds three patents in integrated circuit technology. He is listed in Who’s Who in Technology Today, 1984–1995 and has received the TOBIE Award for most significant R&D\",\"PeriodicalId\":6367,\"journal\":{\"name\":\"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.13109/9783666101458.front\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.13109/9783666101458.front","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

硬件安全依赖于逆向工程的难度来保护关键信息。虽然只要有足够的时间和金钱,几乎任何东西都可以逆向工程,但问题通常是:“值得吗?”知识产权行业使用逆向工程来推动创新,保护专利发明,并执行版权和商业秘密权利。知识产权交易、许可和诉讼依赖于技术信息来推动专利主张和货币化过程。其他人则将逆向工程用于更邪恶的目的。在开始一个复杂的项目之前,必须考虑逆向工程方法的成本和潜在收益。半导体器件和系统的复杂性和集成水平的不断扩大对系统技术原理的分析提出了重大挑战。集成电路中嵌入的硬件加密和软件,以及硬件和软件混淆技术为分析增加了额外的难度。今天,非常复杂的技术被用来分析集成电路和系统的功能、结构和操作。本报告给出了最先进的逆向工程技术的例子,用于硬件和软件系统分析,晶体管电平到原理图电路提取,以及半导体制造过程分析。报告最后讨论了系统设计中的一些最佳实践,这些实践可用于为成功的反向工程攻击创建实质性的障碍。亚当斯博士于1993年加入TAEUS International Corporation。他在管理新产品和技术的定义、开发和转让方面拥有30多年的经验。他曾在Sandia National Laboratories、INMOS、Monolithic Memories、United Technologies和TAEUS担任高级工程和管理职位,并曾在版权、商业秘密和专利侵权案件中担任专家证人。他的专长包括战略规划和项目管理、专利评估和分析、法医工程、过程集成、设备物理、微电子可靠性和故障分析、电子材料、半导体存储器和微处理器、软件、质量管理和微电子辐射效应。他持有三项集成电路技术专利。他被列入1984-1995年《今日科技名人录》,并因最重要的研发而获得TOBIE奖
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Title pages
Hardware security relies on the difficulty of reverse engineering to protect critical information. While virtually anything can be reverse engineered given enough time and money, the question usually is: “is it worth it?” The intellectual property industry uses reverse engineering to drive innovation, to protect patented inventions, and to enforce copyright and trade secret rights. Intellectual property transactions, licensing, and litigation, relies on technical information to drive the patent assertion and monetization process. Others use reverse engineering for more nefarious purposes. The cost and potential benefit of a reverse engineering approach must be considered before embarking on a complex project. The continuous scaling of the complexity and level of integration of semiconductor devices and systems presents major challenges to the analysis of the technological principles of a system. Hardware encryption and software embedded in integrated circuits, together with hardware and software obfuscation techniques add additional layers of difficulty to the analysis. Today, very sophisticated techniques are used to analyze the function, structure and operation of integrated circuits and systems. This presentation gives examples of state-of-the-art reverse engineering techniques for hardware and software system analysis, transistor level-to-schematic circuit extraction, and semiconductor fabrication process analysis. The presentation concludes with a discussion of some of the best practices in system design that can be used to create substantial barriers to the success of a reverse engineering attack. Biography Dr. Adams joined TAEUS International Corporation in 1993. He has over thirty years experience in managing the definition, development, and transfer of new products and technologies. Dr. Adams has held senior engineering and management positions with Sandia National Laboratories, INMOS, Monolithic Memories, United Technologies, and TAEUS, and has served as an expert witness in copyright, trade secret, and patent infringement cases. His expertise includes strategic planning and program management, patent evaluation and analysis, forensic engineering, process integration, device physics, microelectronic reliability and failure analysis, electronic materials, semiconductor memories and microprocessors, software, management of quality, and radiation effects in microelectronics. Dr. Adams holds three patents in integrated circuit technology. He is listed in Who’s Who in Technology Today, 1984–1995 and has received the TOBIE Award for most significant R&D
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Hardware implementations of hash function Luffa Multiplexing methods for power watermarking Side-channel attack resistant ROM-based AES S-Box Entropy-based power attack ExCCel: Exploration of complementary cells for efficient DPA attack resistivity
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1