[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

CONCEALING-Gate: Optical Contactless Probing Resilient Design

Published: 30 June 2021 Publication History

Abstract

Optical probing, though developed as silicon debugging tools from the chip backside, has shown its capability of extracting secret data, such as cryptographic keys and user identifications, from modern system-on-chip devices. Existing optical probing countermeasures are based on detecting any device modification attempt or abrupt change in operating conditions during asset extraction. These countermeasures usually require additional fabrication steps and cause area and power overheads. In this article, we propose a novel low-overhead design methodology to prevent optical probing. It leverages additional operational logic gates, termed as “CONCEALING-Gates,” inserted as neighbor gates of the logic gates connected to the nets carrying asset signals. The switching activity of the asset carrying logic is camouflaged with the switching activity of the concealing-gate. The input signal and placement in the layout of the concealing-gates must be selected in such a way that they remain equally effective in preventing different variants of optical probing, i.e., electro-optical frequency mapping and Electro-optical probing. The methodology is suitable for the existing ASIC/FPGA design flow and fabrication process, since designing new standard logic cells is not required. We have performed a comprehensive security evaluation of the concealing-gates using a security metric developed based on the parameters that are crucial for optical probing. The attack resiliency of the logic cells, protected by concealing-gates, is evaluated using an empirical study-based simulation methodology and experimental validation. Our analysis has shown that in the presence of concealing-gates, logic cells achieve high resiliency against optical contactless probing techniques.

References

[1]
Eli Abuayob et al. 2016. Complex waveform analysis for advanced CMOS ICs: Physics of complex waveform signals for design validation and debug application. In Proceedings of the International Symposium for Testing and Failure Analysis (ISTFA’16).
[2]
Elham Amini, Anne Beyreuther, Norbert Herfurth, Alexander Steigert, Bernd Szyszka, and Christian Boit. 2018. Assessment of a chip backside protection. J. Hardw. Syst. Secur. 2, 4 (2018), 345–352.
[3]
Stephan Borel, L. Duperrex, E. Deschaseaux, J. Charbonnier, J. Cledière, R. Wacquez, J. Fournier, J.-C. Souriau, G. Simon, and A. Merle. 2018. A novel structure for backside protection against physical attacks on secure chips or sip. In Proceedings of the 2018 IEEE 68th Electronic Components and Technology Conference (ECTC’18). IEEE, 515–520.
[4]
Max Born and Emil Wolf. 2013. Principles of Optics: Electromagnetic Theory of Propagation, Interference and Diffraction of Light. Elsevier.
[5]
Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil A. Mallaiyan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, and Domenic Forte. 2020. Hardware trust and assurance through reverse engineering: A survey and outlook from image analysis and machine learning perspectives. arXiv:2002.04210. Retrieved from https://arxiv.org/abs/2002.04210.
[6]
Robert C. Camilletti, Loren A. Haluska, and Keith W. Michael. 1995. Tamper-proof electronic coatings. US Patent 5,458,912.
[7]
Microsemi Corporation. [n.d.]. User Guide: Polarfire FPGA Fabric. Retrieved July 14, 2018 from https://www.microsemi.com/document-portal/doc_view/136522-ug0680-polarfire-fpga-fabric-user-guide.
[8]
Franck Courbon, Sergei Skorobogatov, and Christopher Woods. 2016. Reverse engineering flash eeprom memories using scanning electron microscopy. In Proceedings of the International Conference on Smart Card Research and Advanced Applications. Springer, 57–72.
[9]
Ana Covic, Qihang Shi, Haoting Shen, and Domenic Forte. 2019. Contact-to-silicide probing attacks on integrated circuits and countermeasures. In Proceedings of the 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST’19). IEEE, 1–6.
[10]
Suman Datta. 2018. Ten nanometre CMOS logic technology. Nat. Electr. 1, 9 (2018), 500–501.
[11]
Alexandre Ayres de Sousa. 2017. 3D Monolithic Integration: Performance, Power and Area Evaluation for 14nm and Beyond. Ph.D. Dissertation.
[12]
H. K. Heinrich, B. R. Hemenway, R. A. Marsland, and D. M. Bloom. 1988. A noninvasive optical probe for detecting electrical signals in silicon IC’s. In Review of Progress in Quantitative Nondestructive Evaluation. Springer, 1161–1166.
[13]
Max Hoffmann and Christof Paar. 2021. Doppelganger obfuscation—Exploring the defensive and offensive aspects of hardware camouflaging. In IACR Transactions on Cryptographic Hardware and Embedded Systems. 82--108.
[14]
Steven Kasapi, Roy Ng, Joy Liao, William Lo, Bruce Cory, and Howard Marks. 2012. Comparison of applications of laser probing, laser-induced circuit perturbation and photon emission for failure analysis and yield enhancement. In Proceedings of the 2012 IEEE International Reliability Physics Symposium (IRPS’12). IEEE, 2D–1.
[15]
Ulrike Kindereit. 2009. Investigation of Laser-Beam Modulations Induced by the Operation of Electronic Devices. Doctoral Thesis. TU Berlin, Berlin. https://doi.org/10.14279/depositonce-2143
[16]
Ulrike Kindereit. 2014. Fundamentals and future applications of laser voltage probing. In Proceedings of the 2014 IEEE International Reliability Physics Symposium. IEEE, 3F–1.
[17]
Ulrike Kindereit, Gary Woods, Jing Tian, Uwe Kerst, and Christian Boit. 2007. Investigation of laser voltage probing signals in CMOS transistors. In Proceedings of the 2007 IEEE International Reliability Physics Symposium Proceedings. IEEE, 526–533.
[18]
Ulrike Kindereit, Gary Woods, Jing Tian, Uwe Kerst, Rainer Leihkauf, and Christian Boit. 2007. Quantitative investigation of laser beam modulation in electrically active devices as used in laser voltage probing. IEEE Trans. Device Mater. Reliabil. 7, 1 (2007), 19–30.
[19]
Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, and Jean-Pierre Seifert. 2021. Real-world snapshots vs. theory: Questioning the t-probing security model. In Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP’21). IEEE.
[20]
R. Krishnan, S. Xuan, Lim Gabriel, Tan Abel, Lua Winson, Gopinath Ranganathan, P Angelina, and C Meng. 2018. Pattern search automation for combinational logic analysis. In Proceedings of the International Symposium for Testing and Failure Analysis. 86.
[21]
Leonidas Lavdas, M. Tanjidur Rahman, Mark Tehranipoor, and Navid Asadizanjani. 2020. On optical attacks making logic obfuscation fragile. In Proceedings of the 2020 IEEE International Test Conference in Asia (ITC-Asia’20). IEEE, 71–76.
[22]
Heiko Lohrke, Philipp Scholz, Anne Beyreuther, Ulrike Ganesh, Eckart Uhlmann, Stefan Kühne, Marco Jagodzinski, Yoshitaka Iwaki, Robert Chivas, Scott Silverman, et al. 2016. Contactless fault isolation for FinFET technologies with visible light and GaP SIL. In Proceedings of the 42nd International Symposium for Testing and Failure Analysis.
[23]
Heiko Lohrke, Shahin Tajik, Christian Boit, and Jean-Pierre Seifert. 2016. No place to hide: Contactless probing of secret data on FPGAs. In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems. Springer, 147–167.
[24]
Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, and Jean-Pierre Seifert. 2018. Key extraction using thermal laser stimulation. IACR Transactions on Cryptographic Hardware and Embedded Systems 3 (2018) 573--595.
[25]
Heiko Lohrke, Hannes Zöllner, Philipp Scholz, Shahin Tajik, Christian Boit, and Jean-Pierre Seifert. 2017. Visible light techniques in the finfet era: Challenges, threats and opportunities. In Proceedings of the 2017 IEEE 24th International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA’17). IEEE, 1–6.
[26]
Salvador Manich Bou, Daniel Arumi Delgado, Rosa Rodríguez Montañés, Jordi Mujal Colell, and David Hernández García. 2015. Backside polishing detector: A new protection against backside attacks. In Proceedings of the Conference on Design of Circuits and Integrated Systems (DCIS’15-XXX). 1--6.
[27]
Sravan K. Marella, Amit Ranjan Trivedi, Saibal Mukhopadhyay, and Sachin S. Sapatnekar. 2015. Optimization of FinFET-based circuits using a dual gate pitch technique. In Proceedings of the 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD’15). IEEE, 758–763.
[28]
Yin S. Ng, Ted Lundquist, Dmitry Skvortsov, Joy Liao, Steven Kasapi, and Howard Marks. 2010. Laser voltage imaging: A new perspective of laser voltage probing. In Proceedings of the International Symposium for Testing and Failure Analysis (ISTFA’10). 5–13.
[29]
Opencores.org. [n.d.]. openMSP430. Retrieved from June 6, 2020 https://opencores.org/projects/openmsp430.
[30]
Mir Tanjidur Rahman and Navid Asadizanjani. 2019. Backside security assessment of modern SoCs. In Proceedings of the International Workshop on Microprocessor/SoC Test, Security and Verification (MTV’19). 18–24.
[31]
M. Tanjidur Rahman, M. Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, and Mark Tehranipoor. 2020. Defense-in-depth: A recipe for logic locking to prevail. Integration 72 (2020), 39--57.
[32]
M. Tanjidur Rahman, Qihang Shi, Shahin Tajik, Haoting Shen, Damon L. Woodard, Mark Tehranipoor, and Navid Asadizanjani. 2018. Physical inspection & attacks: New frontier in hardware security. In Proceedings of the 2018 IEEE 3rd International Verification and Security Workshop (IVSW’18). IEEE, 93–102.
[33]
Mir Tanjidur Rahman, Shahin Tajik, M. Sazadur Rahman, Mark Tehranipoor, and Navid Asadizanjani. 2020. The key is left under the mat: On the inappropriate security assumption of logic locking schemes. In Proceedings of the Conference on IEEE International Symposium on Hardware Oriented Security and Trust (HOST’20).
[34]
Jeyavijayan Rajendran, Michael Sam, Ozgur Sinanoglu, and Ramesh Karri. 2013. Security analysis of integrated circuit camouflaging. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. 709–720.
[35]
Venkat Krishnan Ravikumar, Winson Lua, Seah Yi Xuan, Gopinath Ranganathan, and Angeline Phoa. 2015. Combinational logic analysis using laser voltage probing. In ISTFA 2015. ASM International, 35--41.
[36]
Venkat Krishnan Ravikumar, G. Lim, J. M. Chin, Kin Leong Pey, and J. K. W. Yang. 2018. Understanding spatial resolution of laser voltage imaging. Microelectr. Reliabil. 88 (2018), 255–261.
[37]
MOSIS Service. 2009. Design Rules MOSIS Scalable CMOS(SCMOS). Retreived on July 14, 2018 from https://www.ece.rice.edu/Courses/422/manual/mosis_scmos7_2.pdf.
[38]
Bicky Shakya, Haoting Shen, Mark Tehranipoor, and Domenic Forte. 2019. Covert gates: Protecting integrated circuits with undetectable camouflaging. IACR Trans. Cryptogr. Hardw. Embed. Syst. (2019), 86–118.
[39]
Richard A. Soref and Brian R. Bennett. 1987. Electrooptical effects in silicon. IEEE J. Quant. Electr. 23, 1 (1987), 123–129.
[40]
Shahin Tajik, Julian Fietkau, Heiko Lohrke, Jean-Pierre Seifert, and Christian Boit. 2017. Pufmon: Security monitoring of fpgas using physically unclonable functions. In Proceedings of the 2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS’17). IEEE, 186–191.
[41]
Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, and Christian Boit. 2017. On the power of optical contactless probing: Attacking bitstream encryption of FPGAs. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1661–1674.
[42]
Shahin Tajik, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, and Christian Boit. 2014. Emission analysis of hardware implementations. In Proceedings of the 2014 17th Euromicro Conference on Digital System Design. IEEE, 528–534.
[43]
Nidish Vashistha, Hangwei Lu, Qihang Shi, M. Tanjidur Rahman, Haoting Shen, Damon L. Woodard, Navid Asadizanjani, and Mark Tehranipoor. 2018. Trojan scanner: Detecting hardware trojans with rapid SEM imaging combined with image processing and machine learning. In Proceedings from the 44th International Symposium for Testing and Failure Analysis (ISTFA’18). ASM International, 256.
[44]
Nidish Vashistha, M. Tanjidur Rahman, Olivia P. Paradis, and Navid Asadizanjani. 2019. Is backside the new backdoor in modern SoCs? In Proceedings of the 2019 IEEE International Test Conference (ITC’19). IEEE, 1–10.
[45]
Huanyu Wang, Qihang Shi, Adib Nahiyan, Domenic Forte, and Mark M. Tehranipoor. 2019. A physical design flow against front-side probing attacks by internal shielding. IEEE Trans. Comput.-Aid. Des. Integr. Circ. Syst. 39, 10 (2019), 2152--2165.
[46]
Ronald Wilson, Rabin Y. Acharya, Domenic Forte, Navid Asadizanjani, and Damon Woodard. 2019. A novel approach to unsupervised automated extraction of standard cell library for reverse engineering and hardware assurance. In Proceedings of the 45th International Symposium for Testing and Failure Analysis (ISTFA’19). ASM International, 249.
[47]
Ruilong Xie, Kwan-Yong Lim, Min Gyu Sung, and Ryan Ryoung-Han Kim. 2016. Methods of forming single and double diffusion breaks on integrated circuit products comprised of FinFET devices and the resulting products. US Patent 9,412,616.
[48]
Wai Mun Yee, Mario Paniccia, Travis Eiles, and Valluri Rao. 1999. Laser voltage probe (LVP): A novel optical probing technology for flip-chip packaged microprocessors. In Proceedings of the 1999 7th International Symposium on the Physical and Failure Analysis of Integrated Circuits (Cat. No. 99TH8394). IEEE, 15–20.
[49]
Kyungsuk Yi, Minsu Park, Sungyong Cha, and Seungjoo Kim. 2019. Practical silicon-backside-protection method for abnormally detection. J. Semicond. Technol. Sci. 19, 6 (2019), 577–584.
[50]
Haus Zhang, Power Tian, Xuejian Qian, and Winter Wang. 2017. Electro optical probing/frequency mapping (EOP/EOFM) application in failure isolation of advanced analogue devices. In Proceedings of the 2017 IEEE 24th International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA’17). IEEE, 1–5.

Cited By

View all
  • (2024)Lower the RISC: Designing optical-probing-attack-resistant coresMicroprocessors and Microsystems10.1016/j.micpro.2024.105121111(105121)Online publication date: Nov-2024
  • (2024)A novel lightweight CNN for chest X-ray-based lung disease identification on heterogeneous embedded systemApplied Intelligence10.1007/s10489-024-05420-254:6(4756-4780)Online publication date: 4-Apr-2024
  • (2023)FELOPi: A Framework for Simulation and Evaluation of Post-Layout File Against Optical Probing2023 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE56975.2023.10137295(1-2)Online publication date: Apr-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Journal on Emerging Technologies in Computing Systems
ACM Journal on Emerging Technologies in Computing Systems  Volume 17, Issue 3
July 2021
483 pages
ISSN:1550-4832
EISSN:1550-4840
DOI:10.1145/3464978
  • Editor:
  • Ramesh Karri
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 30 June 2021
Accepted: 01 January 2021
Revised: 01 October 2020
Received: 01 June 2020
Published in JETC Volume 17, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Backside protection
  2. hardware security
  3. logic locking
  4. optical probing

Qualifiers

  • Research-article
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)32
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Lower the RISC: Designing optical-probing-attack-resistant coresMicroprocessors and Microsystems10.1016/j.micpro.2024.105121111(105121)Online publication date: Nov-2024
  • (2024)A novel lightweight CNN for chest X-ray-based lung disease identification on heterogeneous embedded systemApplied Intelligence10.1007/s10489-024-05420-254:6(4756-4780)Online publication date: 4-Apr-2024
  • (2023)FELOPi: A Framework for Simulation and Evaluation of Post-Layout File Against Optical Probing2023 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE56975.2023.10137295(1-2)Online publication date: Apr-2023
  • (2023)Blockchain-Based Mechanism for Smart Record Monitoring During and After the COVID-19 PandemicIT Professional10.1109/MITP.2023.331065025:5(20-28)Online publication date: 3-Nov-2023
  • (2023)Laser Voltage Probing Attack Detection With 100% Area/Time Coverage at Above/Below the Bandgap Wavelength and Fully-Automated DesignIEEE Journal of Solid-State Circuits10.1109/JSSC.2023.327459658:10(2919-2930)Online publication date: Oct-2023
  • (2023)Long Short-Term Memory-based Deep Learning Model for COVID-19 Detection using Coughing SoundSN Computer Science10.1007/s42979-023-01934-74:5Online publication date: 30-Jun-2023
  • (2023)Multilayer Approach to Logic LockingUnderstanding Logic Locking10.1007/978-3-031-37989-5_11(279-307)Online publication date: 23-Sep-2023
  • (2023)Emergence of Cutting-Edge Technologies on Logic LockingUnderstanding Logic Locking10.1007/978-3-031-37989-5_10(251-277)Online publication date: 23-Sep-2023
  • (2023)Optical Probing Attack on Logic LockingHardware Security Training, Hands-on!10.1007/978-3-031-31034-8_14(259-271)Online publication date: 30-Jun-2023
  • (2022)A Combined Logical and Physical Attack on Logic ObfuscationProceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design10.1145/3508352.3549349(1-9)Online publication date: 30-Oct-2022
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media