Split Manufacturing Research Page
Please see the following papers for more information or to cite this work:
2016 ICCAD paper:
J. Magaña, D. Shi, and A. Davoodi. Are proximity attacks a threat to the security of split manufacturing of integrated circuits? In International Conf. on Computer-Aided Design, pages 1-7, 2016.
J. Magaña, D. Shi, J. Melchert, and A. Davoodi. Are proximity attacks a threat to the security of split manufacturing of integrated circuits? IEEE Trans. on VLSI, 14 pages,10.1109/TVLSI.2017.2748018, 2017.
The following directories are available on this site:
This directory contains source code that can be used as a starting point for creating a split manufacturing security technique. It provides the code to read a benchmark and initialize some data structures that are helpful for this task. Please see ReadMe and other files in Parser for more information.
This directory contains information about the ISPD 2011 contest benchmarks that can be used with the binary available in the SplitManBinary-ICCAD16 folder. Please see ReadMe and other files in RoutedBenchmarks for more information.
This directory contains the binary jar files and configuration file to run the split manufacturing proximity analysis discussed in the 2016 ICCAD paper on routed benchmarks. Please see ReadMe and other files in SplitManBinary-ICCAD16 for more information.