207 research outputs found
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as an effective countermeasure against
hardware-level threats such as IP piracy, overbuilding, and insertion of
hardware Trojans. Nevertheless, the security promise of split manufacturing has
been challenged by various attacks, which exploit the well-known working
principles of physical design tools to infer the missing BEOL interconnects. In
this work, we advocate a new paradigm to enhance the security for split
manufacturing. Based on Kerckhoff's principle, we protect the FEOL layout in a
formal and secure manner, by embedding keys. These keys are purposefully
implemented and routed through the BEOL in such a way that they become
indecipherable to the state-of-the-art FEOL-centric attacks. We provide our
secure physical design flow to the community. We also define the security of
split manufacturing formally and provide the associated proofs. At the same
time, our technique is competitive with current schemes in terms of layout
overhead, especially for practical, large-scale designs (ITC'99 benchmarks).Comment: DATE 2019 (https://www.date-conference.com/conference/session/4.5
Concerted Wire Lifting: Enabling Secure and Cost-Effective Split Manufacturing
Here we advance the protection of split manufacturing (SM)-based layouts
through the judicious and well-controlled handling of interconnects. Initially,
we explore the cost-security trade-offs of SM, which are limiting its adoption.
Aiming to resolve this issue, we propose effective and efficient strategies to
lift nets to the BEOL. Towards this end, we design custom "elevating cells"
which we also provide to the community. Further, we define and promote a new
metric, Percentage of Netlist Recovery (PNR), which can quantify the resilience
against gate-level theft of intellectual property (IP) in a manner more
meaningful than established metrics. Our extensive experiments show that we
outperform the recent protection schemes regarding security. For example, we
reduce the correct connection rate to 0\% for commonly considered benchmarks,
which is a first in the literature. Besides, we induce reasonably low and
controllable overheads on power, performance, and area (PPA). At the same time,
we also help to lower the commercial cost incurred by SM.Comment: Published in Proc. Asia South Pac. Des. Autom. Conf. (ASPDAC) 201
Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques
Split manufacturing is a promising technique to defend against fab-based
malicious activities such as IP piracy, overbuilding, and insertion of hardware
Trojans. However, a network flow-based proximity attack, proposed by Wang et
al. (DAC'16) [1], has demonstrated that most prior art on split manufacturing
is highly vulnerable. Here in this work, we present two practical layout
techniques towards secure split manufacturing: (i) gate-level graph coloring
and (ii) clustering of same-type gates. Our approach shows promising results
against the advanced proximity attack, lowering its success rate by 5.27x,
3.19x, and 1.73x on average compared to the unprotected layouts when splitting
at metal layers M1, M2, and M3, respectively. Also, it largely outperforms
previous defense efforts; we observe on average 8x higher resilience when
compared to representative prior art. At the same time, extensive simulations
on ISCAS'85 and MCNC benchmarks reveal that our techniques incur an acceptable
layout overhead. Apart from this empirical study, we provide---for the first
time---a theoretical framework for quantifying the layout-level resilience
against any proximity-induced information leakage. Towards this end, we
leverage the notion of mutual information and provide extensive results to
validate our model.Comment: Published in Proc. International Conference On Computer Aided Design
(ICCAD) 2017; [v2] minor fix Fig 11: avg area overhead for g-type2 was
miscalculated; [v3] added DOI to PDF foote
Graph Neural Networks for Hardware Vulnerability Analysis -- Can you Trust your GNN?
The participation of third-party entities in the globalized semiconductor
supply chain introduces potential security vulnerabilities, such as
intellectual property piracy and hardware Trojan (HT) insertion. Graph neural
networks (GNNs) have been employed to address various hardware security
threats, owing to their superior performance on graph-structured data, such as
circuits. However, GNNs are also susceptible to attacks. This work examines the
use of GNNs for detecting hardware threats like HTs and their vulnerability to
attacks. We present BadGNN, a backdoor attack on GNNs that can hide HTs and
evade detection with a 100% success rate through minor circuit perturbations.
Our findings highlight the need for further investigation into the security and
robustness of GNNs before they can be safely used in security-critical
applications.Comment: Will be presented at 2023 IEEE VLSI Test Symposium (VTS
3D Integration: Another Dimension Toward Hardware Security
We review threats and selected schemes concerning hardware security at design
and manufacturing time as well as at runtime. We find that 3D integration can
serve well to enhance the resilience of different hardware security schemes,
but it also requires thoughtful use of the options provided by the umbrella
term of 3D integration. Toward enforcing security at runtime, we envision
secure 2.5D system-level integration of untrusted chips and "all around"
shielding for 3D ICs.Comment: IEEE IOLTS 201
A novel scan architecture for power-efficient, rapid test
Scan-based testing methodologies remedy the testability problem of sequential circuits; yet they suffer from prolonged test time and excessive test power due to numerous shift op-erations. The high density of the unspecified bits in test data enables the utilization of the test response data captured in the scan chain for the generation of the subsequent test stimulus, thus reducing both test time and test data volume. The pro-posed scan-based test scheme accesses only a subset of scan cells for loading the subsequent test stimulus while freezing the remaining scan cells with the response data captured, thus decreasing the scan chain transitions during shift operations. The experimental results confirm the significant reductions in test application time, test data volume and test power achieved by the proposed scan-based testing methodology.
CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist
CAS-Lock (cascaded locking) is a SAT-resilient locking technique, which can simultaneously thwart SAT and bypass attack, while maintaining non-trivial output corruptibility. Despite all of its theoretical guarantees, in this report we expose a serious flaw in its design that can be exploited to break CAS-Lock. Further, this attack neither requires access to a reverse-engineered netlist, nor it requires a working oracle with the correct key loaded onto the chip\u27s memory. We demonstrate that we can activate any CAS-Locked IC without knowing the secret key
- …
