首页> 外文期刊>Microelectronics reliability >A method to prevent hardware Trojans limiting access to layout resources
【24h】

A method to prevent hardware Trojans limiting access to layout resources

机译:一种防止硬件特洛伊木马限制对布局资源的方法的方法

获取原文
获取原文并翻译 | 示例
           

摘要

The advancement of Integrated Circuit (IC) technology has encouraged the IC industries to go fabless and outsource the fabrication to other companies, due to the cost associated with installing a new facility and design to production time limitations. It has also introduced an adverse effect on hardware security, known as Hardware Trojan (HT), which is very difficult to detect due to low signal-to-noise (SNR) ratio. As a result, Hardware Trojan has become a serious concern for the semiconductor industry. Even though researchers have proposed various solutions and design methods to address these security concerns, due to the wide range of Trojans, a comprehensive solution to counteract these security threats is yet far from reach. For now, only specific solutions for certain Trojan detection have been presented. Different Trojan prevention methods have also been explored with optimal hardware security in mind. In this article, a novel Design-For-Security (DFS) idea for HT prevention has been presented where the unused polysilicon layer is occupied using minimum feature wires and thus deprive the attackers of the resources needed for Trojan routing. The main advantage of this technique is that it prevents an attacker from inserting any active layer in the silicon substrate, which is a fundamental component of any CMOS device. Since the active layer connects directly to any polysilicon layer, if the unused polysilicon layer is covered with minimum feature wire, it is impossible for attackers to rout any extra circuitry without removing a portion of the polysilicon wire. A readout circuit is used to determine the delay produced by the added polysilicon wires, which in turn makes sure that the polysilicon layer is intact, and it has not been tampered with. A unique signature is also obtained using those polysilicon wires as probes to induce signal from the main circuit. Any modification to either the circuit or the polysilicon probe will reflect a change in the signature. Simulation results indicate that with a proper design, even the insertion of a single inverter can be detected. This technique can ensure 100% utilization of the empty spaces in the polysilicon layer.
机译:由于与在生产时间限制安装新设施和设计的成本,综合电路(IC)技术的进步鼓励了IC行业向其他公司外包给其他公司的制造。它还引入了对硬件安全的不利影响,称为硬件特洛伊木马(HT),这是由于低信噪比(SNR)比而难以检测。因此,硬件特洛伊木马已成为半导体行业的严重关注。尽管研究人员提出了解决这些安全问题的各种解决方案和设计方法,但由于各种特洛伊木马,抵消这些安全威胁的全面解决方案却远未到达。目前,已经介绍了某些特洛伊木马检测的特定解决方案。考虑到不同的硬件安全性,也探索了不同的特洛伊木马预防方法。在本文中,已经介绍了一种新颖的安全性(DFS)的HT预防思想,其中使用最小特征线占用未使用的多晶硅层,从而剥夺特洛伊木路径所需的资源的攻击者。该技术的主要优点在于它防止攻击者在硅衬底中插入任何有源层,这是任何CMOS器件的基本分量。由于有源层直接连接到任何多晶硅层,因此如果未使用的多晶硅层被最小特征线覆盖,则不可能将攻击者挖掘任何额外的电路而不移除多晶硅线的一部分。读出电路用于确定添加的多晶硅线产生的延迟,这反过来又确保多晶硅层完好无损,并且它没有被篡改。使用这些多晶硅线作为探针也可以获得独特的签名,以引导来自主电路的信号。对电路或多晶硅探针的任何修改都将反映签名的变化。仿真结果表明,通过适当的设计,甚至可以检测到单个逆变器的插入。该技术可以确保多晶硅层中的空空间100%利用空间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号