Empowering Hardware Security using IC Testing Principles
نویسنده
چکیده
Today’s System on Chip (SoC) is being incorporated with digital, analog, radio frequency, photonic and other devices [1]. More recently, sensors, actuators, and biochips are also being integrated into these already powerful SoCs. On one hand, SoC integration has been enabled by advances in mixed system integration and the increase in the wafer sizes (currently about 300 mm and projected to be 450mm by 2018 [1]). Consequently, the cost per chip of such SOCs has reduced. On the other hand, support for multiple capabilities and mixed technologies has increased the cost of ownership of advanced foundries. For instance, the cost of owning a foundry will be $5 billion in 2015 [2]. Consequently, only large commercial foundries now manufacture such high performance, mixed system SoCs especially at the advanced technology nodes [3]. Absent the economies of scale, many of the design companies cannot afford owning and acquiring expensive foundries and hence, outsource their design fabrication to these “one-stop-shop” foundries. This globalization of Integrated Circuit (IC) design flow has introduced security vulnerabilities. If a design is fabricated in a foundry that is outside the direct control of the (fabless) design house, reverse engineering, malicious circuit modification, and Intellectual Property (IP) piracy are possible [3]. An attacker, anywhere in this design flow, can reverse engineer the functionality of an IC/IP, and steal and claim ownership of the IP. An untrusted IC foundry may overbuild ICs and sell the excess parts in the gray market. Rogue elements in the foundry may insert malicious circuits (hardware Trojans) into the design without the designer’s knowledge [4]–[6]. Because of these and similar hardware-based attacks, the semiconductor industry loses $4 billion annually [7].
منابع مشابه
Trustworthy Hardware [Scanning the Issue]
Since the 1990s, there has been a steady trend away from inhouse integrated circuit (IC) design and fabrication toward outsourcing various aspects of design, fabrication, testing, and packaging of ICs. The emergence of such a globalized, horizontal semiconductor business model created hitherto unknown security and trust concerns in the ICs and the information systems (rooted in these ICs), whic...
متن کاملASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملDetection of Security Hacking Attacks by Scan Based TPG Using Verilog
Hardware development of cryptographic algorithms is subject to various attacks. It has been previously demonstrated that scan chains introduce for hardware testability open a back door to potential attacks. Scan based testing is one of the mainly used and powerful test technique since it provides full observability and controllability of the internal nodes of the IC. It has been previously demo...
متن کاملResearch Statement Jeyavijayan ( JV ) Rajendran 1 Motivation
1 Motivation Electronic devices are increasingly used for high-performance applications, such as data centers and networking, as well as energy-constrained applications, such as medical implants and sensors. In many of these applications, security and privacy of user data and computation are required and are usually enforced in software. However, enforcing security and privacy in hardware has g...
متن کاملGuest Editorial Special Section on Hardware Security and Trust
Creating backdoors in integrated circuits (ICs), stealing hardware intellectual property, counterfeiting electronic components , reverse engineering ICs, and injecting malware in ICs are no longer nation state acts requiring specialized, expensive , and unlimited resources. Democratization of IC design has created numerous opportunities for rogues throughout the IC supply chain to inflict these...
متن کامل