{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:22Z","timestamp":1750308562233,"version":"3.41.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2015,6,24]],"date-time":"2015-06-24T00:00:00Z","timestamp":1435104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100012824","name":"Advanced Technology Investment Company","doi-asserted-by":"crossref","award":["2012-TJ-2331"],"award-info":[{"award-number":["2012-TJ-2331"]}],"id":[{"id":"10.13039\/100012824","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["2012-TJ-2331"],"award-info":[{"award-number":["2012-TJ-2331"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Des. Autom. Electron. Syst."],"published-print":{"date-parts":[[2015,6,24]]},"abstract":"<jats:p>Globalization of the integrated circuit design and manufacturing flow has successfully ameliorated design complexity and fabrication cost challenges, and helped deliver cost-effective products while meeting stringent time-to-market requirements. On the flip side, it has resulted in various forms of security vulnerabilities in the supply chain that involves designers, fabs, test facilities, and distributors until the end-product reaches customers. One of the biggest threats to semiconductor industry today is the entry of aged, reject, or cloned parts, that is, counterfeit chips, into the supply chain, leading to annual revenue losses in the order of billions of dollars. While traceability of chips between trusted parties can help monitor the supply chain at various points in the flow, existing solutions are in the form of integrating costly hardware units on chip, or utilizing easy-to-circumvent inspection-based detection techniques. In this article, we propose a technique for adaptive unique ID generation that leverages process variations, enabling chip traceability. The proposed method stimulates digital chips with an analog signal from the supply lines, which serve as primary inputs to each gate in the signal path. Using a sinusoidal signal that exercises the transistors as gain components, we create a chip-specific response that can be post-processed into a digital ID. The proposed technique enables quick and cost-effective authenticity validation that requires no on-chip hardware support. Our simulation and experimentation on actual chips show that the proposed technique is capable of generating unique IDs even in the presence of environmental noise.<\/jats:p>","DOI":"10.1145\/2732408","type":"journal-article","created":{"date-parts":[[2015,6,25]],"date-time":"2015-06-25T14:36:19Z","timestamp":1435242979000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Generation of Unique IDs for Digital Chips through Analog Excitation"],"prefix":"10.1145","volume":"20","author":[{"given":"Chandra K. H.","family":"Suresh","sequence":"first","affiliation":[{"name":"New York University"}]},{"given":"Sule","family":"Ozev","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Ozgur","family":"Sinanoglu","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi"}]}],"member":"320","published-online":{"date-parts":[[2015,6,24]]},"reference":[{"volume-title":"Proceedings of the USENIX Security Symposium (SS'07)","author":"Alkabani Y.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.10"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687424"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAPT.2007.906050"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2002.1046644"},{"key":"e_1_2_1_7_1","unstructured":"DIGITIMES. 2012. Trends in the global IC design service market. http:\/\/www.digitimes.com\/Reports\/Report.asp?datepublish=2012\/3\/13n\\&pages=RSn\\&seq=400n\\&read=toc.  DIGITIMES. 2012. Trends in the global IC design service market. http:\/\/www.digitimes.com\/Reports\/Report.asp?datepublish=2012\/3\/13n\\&pages=RSn\\&seq=400n\\&read=toc."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2135868"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593157"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676548"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378192"},{"key":"e_1_2_1_14_1","unstructured":"IARPA. 2011. Trusted integrated circuits program. https:\/\/www.fbo.gov\/utils\/view?id=b8be3d2c5d5babbdffc6975c370247a6.  IARPA. 2011. Trusted integrated circuits program. https:\/\/www.fbo.gov\/utils\/view?id=b8be3d2c5d5babbdffc6975c370247a6."},{"key":"e_1_2_1_15_1","unstructured":"ITRS. 2011. International technology roadmap for semiconductors. http:\/\/www.itrs.net\/Links\/2011ITRS\/Home2011.htm.  ITRS. 2011. International technology roadmap for semiconductors. http:\/\/www.itrs.net\/Links\/2011ITRS\/Home2011.htm."},{"volume-title":"Proceedings of the IEEE\/ACM Conference on Design Automation Test in Europe (DATE'13)","author":"Kae-Nune N.","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"J. Keane X. Wang P. Jain and C. H. Kim. 2014. On-chip silicon odometers for circuit aging characterization. In Bias Temperature Instability for Devices and Circuits Springer New York 679--717.  J. Keane X. Wang P. Jain and C. H. Kim. 2014. On-chip silicon odometers for circuit aging characterization. In Bias Temperature Instability for Devices and Circuits Springer New York 679--717.","DOI":"10.1007\/978-1-4614-7909-3_27"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228386"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2006.54"},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"A. Maiti V. Gunreddy and P. Schaumont. 2012. A systematic method to evaluate and compare the performance of physical unclonable functions. In Embedded System Design with FPGAs Springer New York 245--267.  A. Maiti V. Gunreddy and P. Schaumont. 2012. A systematic method to evaluate and compare the performance of physical unclonable functions. In Embedded System Design with FPGAs Springer New York 245--267.","DOI":"10.1007\/978-1-4614-1362-2_11"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1502781.1502786"},{"key":"e_1_2_1_22_1","unstructured":"A. Oppenheim A. Willsky H. Nawab and S. Hamid. 1996. Signal and Systems 2nd Ed. Prentice-Hall.   A. Oppenheim A. Willsky H. Nawab and S. Hamid. 1996. Signal and Systems 2 nd Ed. Prentice-Hall."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2006.1628506"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1960.1057584"},{"volume-title":"Proceedings of the IEEE\/ACM Conference on Design Automation Test in Europe (DATE'12)","author":"Rajendran J.","key":"e_1_2_1_25_1"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2013.2239134"},{"volume-title":"Introduction to Coding Theory","author":"Roth R.","key":"e_1_2_1_29_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511808968"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403631"},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"U. Ruhrmair S. Devadas and F. Koushanfar. 2011. Security based on physical unclonability and disorder. In Introduction to Hardware Security and Trust Springer New York 65--102.  U. Ruhrmair S. Devadas and F. Koushanfar. 2011. Security based on physical unclonability and disorder. In Introduction to Hardware Security and Trust Springer New York 65--102.","DOI":"10.1007\/978-1-4419-8080-9_4"},{"key":"e_1_2_1_32_1","unstructured":"SEMI. 2008. www.semi.org\/en\/Press\/P043775.  SEMI. 2008. www.semi.org\/en\/Press\/P043775."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.910961"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2008.917502"},{"volume-title":"Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection","author":"Tehranipoor M.","key":"e_1_2_1_35_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-00816-5"},{"volume-title":"Proceedings of the IEEE\/ACM International Conference on Computer-Aided Design (ICCAD'14)","author":"Wang M.","key":"e_1_2_1_36_1"},{"volume-title":"Proceedings of the IEEE\/ACM International Conference on Computer-Aided Design (ICCAD'14)","author":"Wendt J.","key":"e_1_2_1_37_1"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228486"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378192"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2006.884077"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593102"}],"container-title":["ACM Transactions on Design Automation of Electronic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2732408","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2732408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:10Z","timestamp":1750273450000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2732408"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,24]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,6,24]]}},"alternative-id":["10.1145\/2732408"],"URL":"https:\/\/doi.org\/10.1145\/2732408","relation":{},"ISSN":["1084-4309","1557-7309"],"issn-type":[{"type":"print","value":"1084-4309"},{"type":"electronic","value":"1557-7309"}],"subject":[],"published":{"date-parts":[[2015,6,24]]},"assertion":[{"value":"2014-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}