Abstract

It is important for manufacturers of silicon chips to guard against counterfeit chips, hardware trojans, exploits, royalty-avoiding mechanisms, and other malicious hardware injected into a production stream. The techniques of this disclosure create individualized chip signatures during the manufacturing process. The signatures can be used to detect counterfeit silicon or otherwise suspicious on-board componentry.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS