Loading [MathJax]/extensions/MathZoom.js
Routing perturbation for enhanced security in split manufacturing | IEEE Conference Publication | IEEE Xplore

Routing perturbation for enhanced security in split manufacturing


Abstract:

Split manufacturing can mitigate security vulnerabilities at untrusted foundries by exposing only partial designs. Even so, attackers can make educated guess according to...Show More

Abstract:

Split manufacturing can mitigate security vulnerabilities at untrusted foundries by exposing only partial designs. Even so, attackers can make educated guess according to design conventions and thereby recover entire chip designs. In this work, a routing perturbation-based defense method is proposed such that such attacks become very difficult while wirelength/timing overhead is restricted to be very small. Experimental results on benchmark circuits confirm the effectiveness of the proposed techniques. The new techniques also significantly outperform the latest previous work.
Date of Conference: 16-19 January 2017
Date Added to IEEE Xplore: 20 February 2017
ISBN Information:
Electronic ISSN: 2153-697X
Conference Location: Chiba, Japan
References is not available for this document.

I. Introduction

Maintaining a state-of-art semiconductor manufacturing facility has become expensive; the cost of owning and maintaining a foundry costs several billion dollars [1]. Thus, only high-end commercial foundries manufacture high performance, mixed-system integrated circuits (ICs), especially at the advanced technology nodes [2]. Many design companies cannot afford owning and acquiring expensive foundries; hence, they outsource their fabrication process to these “one-stop-shop” foundries. While globalization of IC production flow has reduced design complexity and fabrication cost, it has introduced several security vulnerabilities [3]. An attacker anywhere in the IC supply chain can perform the following attacking techniques: reverse engineering, malicious circuit insertion, counterfeiting, and intellectual property (IP) piracy [2], [4]–[7]. Because of these attacks, the semiconductor industry loses billions of dollars annually [8]. These attacks are possible because designers have no control over their design in this distributed supply chain. More importantly, current electronic design automation (EDA) tools do not consider security as a design objective.

Select All
1.
"Trends in the global IC design service market", DIGITIMES Research, 2012, [online] Available: http://www.digitimes.com/news/a20120313RS400.html?chid=2.
2.
"Trusted Integrated Circuits Program", Intelligence Advanced Research Projects Activity, 2011, [online] Available: https://www.fbo.gov/utils/view?id=b8be3d2c5d5babbdffc6975c370247a6.
3.
"Defense Science Board (DSB) study on High Performance Microchip Supply", DARPA, 2005, [online] Available: http://www.acq.osd.mil/dsb/reports/ada435563.pdf.
4.
M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection", IEEE Design and Test of Computers, vol. 27, no. 1, pp. 10-25, 2010.
5.
R. Torrance and D. James, "The state-of-the-art in semiconductor reverse engineering", IEEE/ACM Design Automation Conference, pp. 333-338, 2011.
6.
U. Guin, K. Huang, D. DiMase, J. Carulli, M. Tehranipoor and Y. Makris, "Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain", Proceedings of the IEEE, vol. 102, no. 8, pp. 1207-1228, 2014.
7.
S. Bhunia, M. Hsiao, M. Banga and S. Narasimhan, "Hardware Trojan Attacks: Threat Analysis and Countermeasures", Proceedings of the IEEE, vol. 102, no. 8, pp. 1229-1247, 2014.
8.
"Innovation is at risk as semiconductor equipment and materials industry loses up to \$4 billion annually due to IP infringement", SEMI, 2008, [online] Available: www.semi.org/en/press/p043775.
9.
J. Rajendran, O. Sinanoglu and R. Karri, "Is split manufacturing secure?", IEEE/ACM Design Automation and Test in Europe, pp. 1259-1264, 2013.
10.
K. Vaidyanathan, B. P. Das, E. Sumbul, R. Liu and L. Pileggi, "Building Trusted ICs using Split Fabrication", IEEE Symposium on Hardware Oriented Security and Trust, pp. 1-6, 2014.
11.
R. Jarvis and M. G. McIntyre, "Split manufacturing method for advanced semiconductor circuits", 2004.
12.
K. Vaidyanathan, R. Liu, E. Sumbul, Q. Zhu, F. Franchetti and L. Pileggi, "Efficient and Secure Intellectual Property (IP) Design for Split Fabrication", IEEE Symposium on Hardware Oriented Security and Trust, pp. 13-18, 2014.
13.
B. Hill, R. Karmazin, C. Otero, J. Tse and R. Manohar, "A split-foundry asynchronous FPGA", IEEE Custom Integrated Circuits Conference, pp. 1-4, 2013.
14.
K. Vaidyanathan, B. P. Das, E. Sumbul, R. Liu and L. Pileggi, "Detecting reliability attacks during split fabrication using test-only beol stack", IEEE/ACM Design Automation Conference, pp. 156:1-156:6, 2014.
15.
C. Otero, J. Tse, R. Karmazin, B. Hill and R. Manohar, "Automatic obfuscated cell layout for trusted split-foundry design", IEEE International Symposium on Hardware Oriented Security and Trust, pp. 56-61, 2015.
16.
S. Mitra, H.-S. Wong and S. Wong, "Stopping Hardware Trojans in Their Tracks", 2015, [online] Available: http://spectrum.ieee.org/semiconductors/design/stopping-hardware-trojans-in-their-tracks.
17.
Y. Bi, J. Yuan and Y. Jin, "Beyond the Interconnections: Split Manufacturing in RF Designs", MDPI Electronics, vol. 4, pp. 541-564, 2015.
18.
M. Jagasivamani, P. Gadfort, M. Sika, M. Bajura and M. Fritze, "Split Fabrication Obfuscation: Metrics and Techniques", IEEE Symposium on Hardware Oriented Security and Trust, pp. 7-12, 2014.
19.
F. Imeson, A. Emtenan, S. Garg and M. V. Tripunitara, "Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation", USENIX Conference on Security, pp. 495-510, 2013.
20.
Y. Xie, C. Bao and A. Srivastava, "Security-aware design flow for 2.5D IC technology", ACM International Workshop on Trustworthy Embedded Devices, pp. 31-38, 2015.
21.
J. Valamehr et al., "A 3-D Split Manufacturing Approach to Trustworthy System Development", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 32, no. 4, pp. 611-615, 2013.
22.
K. Xiao, D. Forte and M. Tehranipoor, "Efficient and secure split manufacturing via obfuscated built-in self-authentication", IEEE International Symposium on Hardware Oriented Security and Trust, pp. 14-19, 2015.
23.
Y. Wang, P. Chen, J. Hu and J. J. Rajendran, "The cat and mouse in split manufacturing", Proceedings of the ACM/IEEE Design Automation Conference, pp. 165:1-165:6, 2016.
24.
J. Rajendran, Y. Pino, O. Sinanoglu and R. Karri, "Logic Encryption: A Fault Analysis Perspective", Proc. Design Automation Test in Europe, pp. 953-958, 2012.
25.
M. Rostami, F. Koushanfar and R. Karri, "A primer on hardware security: Models methods and metrics", Proceedings of the IEEE, vol. 102, no. 8, pp. 1283-1295, 2014.
26.
M. L. Bushnell and V. D. Agrawal, "Essentials of Electronic Testing for Digital Memory and Mixed-Signal VLSI Circuits" in , Boston:Kluwer Academic Publishers, 2000.
27.
L. H. Goldstein and E. L. Thigpen, "Scoap: Sandia controllability/observability analysis program", Proceedings of the ACM/IEEE Design Automation Conference, pp. 190-196, 1980.
28.
M. Hansen, H. Yalcin and J. Hayes, "Unveiling the ISCAS-85 benchmarks: a case study in reverse engineering", IEEE Design Test of Computers, vol. 16, no. 3, pp. 72-80, 1999.
29.
F. Corno, M. S. Reorda and G. Squillero, "RTL-Level ITC99 Benchmarks and First ATPG Results", IEEE Des. Test, vol. 17, no. 3, pp. 44-53, 2000.
30.
"Berkeley Predictive Technology Model (PTM)", [online] Available: http://ptm.asu.edu/.

Contact IEEE to Subscribe

References

References is not available for this document.