iPROBE: Internal Shielding Approach for Protecting Against Front-side and Back-side Probing Attacks (2024)

Related Papers

ACM Transactions on Design Automation of Electronic Systems

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

Rabin Acharya

Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly used in several fields to improve performance and the level of automation. In recent years, this use has exponentially increased due to the advancement of high-performance computing and the ever increasing size of data. One of such fields is that of hardware design—specifically the design of digital and analog integrated circuits, where AI/ ML techniques have been extensively used to address ever-increasing design complexity, aggressive time to market, and the growing number of ubiquitous interconnected devices. However, the security concerns and issues related to integrated circuit design have been highly overlooked. In this article, we summarize the state-of-the-art in AI/ML for circuit design/optimization, security and engineering challenges, research in security-aware computer-aided design/electronic design automation, and future research directions and needs for using AI/ML for security-awa...

View PDF

Integration

Defense-in-depth: A recipe for logic locking to prevail

2020 •

Sazadur Rahman

View PDF

2021 •

sofiane takarabt

View PDF

2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)

Cryptographically secure shields

2014 •

Yves Mathieu

View PDF

ACM Journal on Emerging Technologies in Computing Systems

A Survey on Chip to System Reverse Engineering

2016 •

John Chandy

The reverse engineering (RE) of electronic chips and systems can be used with honest and dishonest intentions. To inhibit RE for those with dishonest intentions (e.g., piracy and counterfeiting), it is important that the community is aware of the state-of-the-art capabilities available to attackers today. In this article, we will be presenting a survey of RE and anti-RE techniques on the chip, board, and system levels. We also highlight the current challenges and limitations of anti-RE and the research needed to overcome them. This survey should be of interest to both governmental and industrial bodies whose critical systems and intellectual property (IP) require protection from foreign enemies and counterfeiters who possess advanced RE capabilities.

View PDF

Proceedings of the International Conference on Omni-Layer Intelligent Systems

Protect Your Chip Design Intellectual Property

Ozgur Sinanoglu

View PDF

ACM Transactions on Design Automation of Electronic Systems

IP Protection and Supply Chain Security through Logic Obfuscation

Saverio Fazzari

The globalization of the semiconductor supply chain introduces ever-increasing security and privacy risks. Two major concerns are IP theft through reverse engineering and malicious modification of the design. The latter concern in part relies on successful reverse engineering of the design as well. IC camouflaging and logic locking are two of the techniques under research that can thwart reverse engineering by end-users or foundries. However, developing low overhead locking/camouflaging schemes that can resist the ever-evolving state-of-the-art attacks has been a challenge for several years. This article provides a comprehensive review of the state of the art with respect to locking/camouflaging techniques. We start by defining a systematic threat model for these techniques and discuss how various real-world scenarios relate to each threat model. We then discuss the evolution of generic algorithmic attacks under each threat model eventually leading to the strongest existing attacks....

View PDF

IEEE Transactions on Computers

Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks

2000 •

Guido Bertoni, Sylvain Guilley

Abstract—Logic styles with constant power consumption are promising solutions to counteract side-channel attacks on sensitive cryptographic devices. Recently, one vulnerability has been identified in a standard-cell based power-constant logic called WDDL. Another logic, ...

View PDF

IEEE Transactions on Computers

Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics

2000 •

Florent Flament

View PDF

Using Supply Voltage Metal Layers as Low Cost Means to Hinder Several Types of Physical Attacks

SDIWC Organization

In this paper, we describe the idea of using the metallization layers used for supplying ICs with VDD and GND as a low-cost countermeasure for semi-invasive front-side attacks. The core of our idea is to realize both supply voltages – GND and VDD – no longer fixed on metal one but to shift them up in different top metal layers and to implement it both as metal plane. This helps to prevent semi invasive attacks that require an optical access to the transistor level while the device is fully functional. An additional countermeasure effect may be hindering of EMA, PA and microprobing. Early experiments with a simple 3x3 multiplier show that our idea can be used with standard layout tools such as encounter from synopsis.

View PDF
iPROBE: Internal Shielding Approach for Protecting Against Front-side and Back-side Probing Attacks (2024)

References

Top Articles
Latest Posts
Article information

Author: Jamar Nader

Last Updated:

Views: 5923

Rating: 4.4 / 5 (55 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Jamar Nader

Birthday: 1995-02-28

Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

Phone: +9958384818317

Job: IT Representative

Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.