首页> 外文期刊>Very Large Scale Integration (VLSI) Systems, IEEE Transactions on >Are Proximity Attacks a Threat to the Security of Split Manufacturing of Integrated Circuits?
【24h】

Are Proximity Attacks a Threat to the Security of Split Manufacturing of Integrated Circuits?

机译:邻近攻击是否会威胁到集成电路分体制造的安全性?

获取原文
获取原文并翻译 | 示例

摘要

Split manufacturing is a technique that allows manufacturing the transistor-level and lower metal layers of an integrated circuit (IC) at a high-end, untrusted foundry, while manufacturing only the higher metal layers at a smaller, trusted foundry. Using split manufacturing is only viable if the untrusted foundry cannot reverse engineer the higher metal layer connections (and thus the overall IC design) from the lower layers. This paper studies the effectiveness of proximity attack as a key step to reverse engineer a design at the untrusted foundry. We propose and study different proximity attacks based on how a set of candidates are defined for each broken connection. The attacks use both placement and routing information along with factors which capture the router's behavior such as per-layer routing congestion. Our studies are based on designs having millions of nets routed across nine metal layers and significant layer-by-layer wire size variation. Our results show that a common, Hamming distance-based proximity attack seldom achieves a match rate over 5%. But our proposed attack yields a relatively small list of candidates which often contains the correct match. Finally, we propose a procedure to artificially insert routing blockages in a design at a desired split level, without causing any area overhead, in order to trick the router to make proximity-based reverse engineering significantly more challenging.
机译:拆分制造是一种允许在高端,不受信任的代工厂中制造集成电路(IC)的晶体管级和较低金属层的技术,而仅在较小的,受信任的代工厂中制造较高的金属层。仅当不受信任的代工厂无法对较低层的较高金属层连接(以及整体IC设计)进行反向工程时,使用拆分制造才可行。本文研究了邻近攻击的有效性,该有效性是在不受信任的铸造厂对设计进行反向工程的关键步骤。我们根据如何为每个断开的连接定义一组候选对象,提出并研究不同的邻近攻击。攻击同时使用布局和路由信息以及捕获路由器行为的因素,例如每层路由拥塞。我们的研究基于具有数百万个穿过九个金属层的布线网以及逐层导线尺寸变化显着的设计。我们的结果表明,基于汉明距离的常见近距离攻击很少能达到5%以上的匹配率。但是我们提出的攻击产生的候选者列表相对较小,通常包含正确的匹配项。最后,我们提出了一种程序,可以在设计中以期望的分割级别人为地插入路由障碍物,而不会引起任何区域开销,从而诱骗路由器使基于邻近性的逆向工程更具挑战性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号