Skip to main content
Top

2021 | OriginalPaper | Chapter

Enabling Trust for Advanced Semiconductor Solutions Based on Physical Layout Verification

Authors : Matthias Ludwig, Bernhard Lippmann, Niklas Unverricht

Published in: Intelligent System Solutions for Auto Mobility and Beyond

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With growing connectivity in consumer and industrial applications, the need for security rises proportionally. Compromises in security design of e.g. autonomous driving systems endanger not only material goods but may threaten personal life of humans. Besides the demand for functional safety of complex, connected systems, cyber security is paramount. As the traditional verification flow is only dealing with functionality, reliability and safety aspects, a trusted design flow extends this by adding aspects of hardware vulnerabilities in verification and certification. Consequently, without full trust in the globally distributed development and production process, semiconductor manufacturers need to check that no malicious modifications are inserted. Physical layout verification is achieved via a comparison of the recovered chip layout extracted from an application against the design data. To enable trust, a comprehensive figure of merit has been defined to evaluate the correlation of the layout extraction to design data. Using this figure of merit (FoM), it is shown on a 40 nm sample that ultra-high scanning speeds still deliver adequate image quality.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Semiconductor Industry Association: Winning the battle against counterfeit semiconductor products (2013) Semiconductor Industry Association: Winning the battle against counterfeit semiconductor products (2013)
4.
go back to reference Hunt, G , Letey, G., Nightingale, E.B.: The seven properties of highly secure devices. In: Microsoft Research NExT Operating Systems Technologies Group (2017) Hunt, G , Letey, G., Nightingale, E.B.: The seven properties of highly secure devices. In: Microsoft Research NExT Operating Systems Technologies Group (2017)
7.
go back to reference Bao, C., Forte, D., Srivastava, A.: On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(1), 49–57 (2016)CrossRef Bao, C., Forte, D., Srivastava, A.: On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(1), 49–57 (2016)CrossRef
8.
go back to reference Vashistha, N., Lu, H., Shi, Q., Rahman, M.T., Shen, H., Woodard, D.L., Asadizanjani, N., Tehranipoor, M.: Trojan scanner: Detecting hardware trojans with rapid SEM imaging combined with image processing and machine learning (2018) Vashistha, N., Lu, H., Shi, Q., Rahman, M.T., Shen, H., Woodard, D.L., Asadizanjani, N., Tehranipoor, M.: Trojan scanner: Detecting hardware trojans with rapid SEM imaging combined with image processing and machine learning (2018)
9.
go back to reference Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)CrossRef Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)CrossRef
10.
go back to reference Yang, K., Hicks, M., Dong, Q., Austin, T., Sylvester, D.: Exploiting the analog properties of digital circuits for malicious hardware. Commun. ACM 60, 83–91 (2017)CrossRef Yang, K., Hicks, M., Dong, Q., Austin, T., Sylvester, D.: Exploiting the analog properties of digital circuits for malicious hardware. Commun. ACM 60, 83–91 (2017)CrossRef
11.
go back to reference Dabrowski, A., Hobel, H., Ullrich, J., Krombholz, K., Weippl, E.: Towards a hardware Trojan detection cycle. In: Ninth International Conference on Availability, Reliability and Security, pp. 287–294 (2014). Dabrowski, A., Hobel, H., Ullrich, J., Krombholz, K., Weippl, E.: Towards a hardware Trojan detection cycle. In: Ninth International Conference on Availability, Reliability and Security, pp. 287–294 (2014).
12.
go back to reference Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards Trojan-free trusted ICS: problem analysis and detection scheme. Proceedings of the Conference on Design, Automation and Test in Europe, ACM, pp. 1362–1365 (2008) Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards Trojan-free trusted ICS: problem analysis and detection scheme. Proceedings of the Conference on Design, Automation and Test in Europe, ACM, pp. 1362–1365 (2008)
13.
go back to reference Kutzner, S., Poschmann, A.Y., Stottinger, M.: Hardware Trojan design and detection: a practical evaluation. In: Proceedings of the Workshop on Embedded Systems Security, ser. WESS 2013. ACM, New York, p. 1:1–1:9 (2013) Kutzner, S., Poschmann, A.Y., Stottinger, M.: Hardware Trojan design and detection: a practical evaluation. In: Proceedings of the Workshop on Embedded Systems Security, ser. WESS 2013. ACM, New York, p. 1:1–1:9 (2013)
14.
go back to reference Liu, Y., Huang, K., Makris, Y.: Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting. In: Proceedings of the 51st Annual Design Automation Conference, ser. DAC 2014. ACM, New York, p. 155:1–155:6 (2014) Liu, Y., Huang, K., Makris, Y.: Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting. In: Proceedings of the 51st Annual Design Automation Conference, ser. DAC 2014. ACM, New York, p. 155:1–155:6 (2014)
15.
go back to reference Rooney, C., Bellekens, X., Seeam, A.: Creation and detection of hardware trojans using non-invasive off-the-shelf technologies. Electron. Lett. 7, 124 (2018) Rooney, C., Bellekens, X., Seeam, A.: Creation and detection of hardware trojans using non-invasive off-the-shelf technologies. Electron. Lett. 7, 124 (2018)
16.
go back to reference Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: 2009 IEEE International High Level Design Validation and Test Workshop, pp. 166–171 (2009) Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: 2009 IEEE International High Level Design Validation and Test Workshop, pp. 166–171 (2009)
17.
go back to reference Lippmann, B., Werner, M., Unverricht, N., Singla, A., Egger, P., Dubotzky, A., Gieser, H., Rasche, M., Kellermann, O., Graeb, H.: Integrated flow for¨ reverse engineering of nanoscale technologies. In: Proceedings of the 24th Asia and South Pacific Design Automation Conference, ser. ASPDAC 2019. ACM, New York, pp. 82–89 (2019) Lippmann, B., Werner, M., Unverricht, N., Singla, A., Egger, P., Dubotzky, A., Gieser, H., Rasche, M., Kellermann, O., Graeb, H.: Integrated flow for¨ reverse engineering of nanoscale technologies. In: Proceedings of the 24th Asia and South Pacific Design Automation Conference, ser. ASPDAC 2019. ACM, New York, pp. 82–89 (2019)
18.
go back to reference Vogel, M.: Handbook of Charged Particle Optics, 2nd ed., J. Orloff, Ed. Contemporary Physics, vol. 51, no. 4 (2010) Vogel, M.: Handbook of Charged Particle Optics, 2nd ed., J. Orloff, Ed. Contemporary Physics, vol. 51, no. 4 (2010)
19.
go back to reference Werner, M., Lippmann, B., Baehr, J., Grab, H.: Reverse engineering of cryptographic cores by structural interpretation through graph analysis. In: 3rd IEEE International Verification and Security Workshop, IVSW 2018, Costa Brava, Spain, 2–4 July 2018, pp. 13–18 (2018) Werner, M., Lippmann, B., Baehr, J., Grab, H.: Reverse engineering of cryptographic cores by structural interpretation through graph analysis. In: 3rd IEEE International Verification and Security Workshop, IVSW 2018, Costa Brava, Spain, 2–4 July 2018, pp. 13–18 (2018)
20.
go back to reference Couch, J., Reilly, E., Schuyler, M., Barrett, B.: Functional block identification in circuit design recovery, pp. 75–78 (2016) Couch, J., Reilly, E., Schuyler, M., Barrett, B.: Functional block identification in circuit design recovery, pp. 75–78 (2016)
21.
go back to reference Azriel, L., Ginosar, R., Mendelson, A.: SoK: an overview of algorithmic methods in IC reverse engineering. In: Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ser. ASHES 2019. Association for Computing Machinery, New York, pp. 65–74 (2019) Azriel, L., Ginosar, R., Mendelson, A.: SoK: an overview of algorithmic methods in IC reverse engineering. In: Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ser. ASHES 2019. Association for Computing Machinery, New York, pp. 65–74 (2019)
22.
go back to reference Singla, A., Lippmann, B., Graeb, H.: Verification of physical chip layouts using GDSII design data, pp. 55–60 (2019) Singla, A., Lippmann, B., Graeb, H.: Verification of physical chip layouts using GDSII design data, pp. 55–60 (2019)
23.
go back to reference Shoji, S., Koyama, A.: A fast classification method of isomorphic polygons in design data of large scale integrated circuit. In: 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS), pp. 204–209 (2016) Shoji, S., Koyama, A.: A fast classification method of isomorphic polygons in design data of large scale integrated circuit. In: 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS), pp. 204–209 (2016)
24.
go back to reference Weste, N.H.E., Eshraghian, K.: Principles of CMOS VLSI Design: A Systems Perspective. Addison-Wesley Longman Publishing Co., Inc, Boston (1985) Weste, N.H.E., Eshraghian, K.: Principles of CMOS VLSI Design: A Systems Perspective. Addison-Wesley Longman Publishing Co., Inc, Boston (1985)
Metadata
Title
Enabling Trust for Advanced Semiconductor Solutions Based on Physical Layout Verification
Authors
Matthias Ludwig
Bernhard Lippmann
Niklas Unverricht
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-65871-7_7

Premium Partner