Gate characterization using singular value decomposition: Foundations and applications

Sheng Wei, Ani Nahapetian, Michael Nelson, Farinaz Koushanfar, Miodrag Potkonjak

Research output: Contribution to journalArticlepeer-review

15 Scopus citations


Modern hardware security has a very broad scope ranging from digital rights management to the detection of ghost circuitry. These and many other security tasks are greatly hindered by process variation, which makes each integrated circuit (IC) unique, and device aging, which evolves the IC throughout its lifetime. We have developed a singular value decomposition (SVD)-based procedure for gate-level characterization (GLC) that calculates changes in properties, such as delay and switching power of each gate of an IC, accounting for process variation and device aging. We employ our SVD-based GLC approach for the development of two security applications: hardware metering and ghost circuitry (GC) detection. We present the first robust and low-cost hardware metering scheme, using an overlapping IC partitioning approach that enables rapid and scalable treatment. We also map the GC detection problem into an equivalent task of GLC consistency checking using the same overlapping partitioning. The effectiveness of the approaches is evaluated using the ISCAS85, ISCAS89, and ITC99 benchmarks. In hardware metering, we are able to obtain probabilities of coincidence in the magnitude of 10 -8 or less, and we obtain zero false positives and zero false negatives in GC detection.

Original languageEnglish (US)
Article number6112216
Pages (from-to)765-773
Number of pages9
JournalIEEE Transactions on Information Forensics and Security
Issue number2
StatePublished - Apr 2012
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications


  • Gate-level characteristics
  • ghost circuitry
  • hardware metering
  • process variation
  • singular value decomposition


Dive into the research topics of 'Gate characterization using singular value decomposition: Foundations and applications'. Together they form a unique fingerprint.

Cite this