[go: up one dir, main page]

Hsu et al., 2023 - Google Patents

Security-aware physical design against Trojan insertion, frontside probing, and fault injection attacks

Hsu et al., 2023

View PDF
Document ID
1827164618026839558
Author
Hsu J
Chen K
Chen Y
Lo Y
Chang Y
Publication year
Publication venue
Proceedings of the 2023 International Symposium on Physical Design

External Links

Snippet

The dramatic growth of hardware attacks and the lack of security-concern solutions in design tools lead to severe security problems in modern IC designs. Although many existing countermeasures provide decent protection against security issues, they still lack the global …
Continue reading at www.cs.nthu.edu.tw (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5068Physical circuit design, e.g. layout for integrated circuits or printed circuit boards
    • G06F17/5081Layout analysis, e.g. layout verification, design rule check
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5068Physical circuit design, e.g. layout for integrated circuits or printed circuit boards
    • G06F17/5077Routing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2217/00Indexing scheme relating to computer aided design [CAD]
    • G06F2217/12Design for manufacturability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
US11264990B2 (en) Physically unclonable camouflage structure and methods for fabricating same
Xiao et al. A novel built-in self-authentication technique to prevent inserting hardware trojans
Xiao et al. Efficient and secure split manufacturing via obfuscated built-in self-authentication
Vaidyanathan et al. Building trusted ICs using split fabrication
Wang et al. A physical design flow against front-side probing attacks by internal shielding
Xie et al. Security-aware design flow for 2.5 D IC technology
US10073728B2 (en) System, method and computer-accessible medium for fault analysis driven selection of logic gates to be camouflaged
Knechtel et al. Protect your chip design intellectual property: An overview
EP4216274B1 (en) System and method for protecting an integrated circuit (ic) device
Xie et al. Security-aware 2.5 D integrated circuit design flow against hardware IP piracy
Gao et al. iprobe: Internal shielding approach for protecting against front-side and back-side probing attacks
US11087058B1 (en) Prevention of front-side probing attacks
Knechtel et al. Benchmarking security closure of physical layouts: ISPD 2022 contest
Hsu et al. Security-aware physical design against Trojan insertion, frontside probing, and fault injection attacks
Bhandari et al. DEFending integrated circuit layouts
Trippel et al. T-TER: Defeating A2 trojans with targeted tamper-evident routing
Guo et al. ASSURER: A PPA-friendly security closure framework for physical design
Yang et al. How secure is split manufacturing in preventing hardware trojan?
Wei et al. Rethinking IC layout vulnerability: Simulation-based hardware trojan threat assessment with high fidelity
Zhang et al. Icmarks: A robust watermarking framework for integrated circuit physical design ip protection
Shi et al. Obfuscated built-in self-authentication with secure and efficient wire-lifting
Xu et al. Layout recognition attacks on split manufacturing
Cui et al. Split manufacturing-based register transfer-level obfuscation
Shi et al. Obfuscated built-in self-authentication
Cheng et al. A similarity based circuit partitioning and trimming method to defend against hardware Trojans