Backside Shield against Physical Attacks for Secure ICs.

Author(s):  
Stéphan BOREL ◽  
Edouard DESCHASEAUX ◽  
Jean CHARBONNIER ◽  
Philippe MEDINA ◽  
Stéphanie ANCEAU ◽  
...  

Although the implementation of multiple countermeasures, both hardware and software, are making integrated circuits more and more secure, the backside of a chip is still considered as a vulnerability regarding physical attacks. A novel protection structure will be presented here, which consists in combining several elements to make it impossible for a hacker to use the backside of a chip as an access to the active parts of the IC without triggering an alert. The integration flow is using standard processes coming from the world of packaging and it is applied on commonly available industrial tools. Cybersecurity by hardware can thus be implemented at low additional cost. In order to weaken the chip in case of milling, deep cavities are etched into the substrate. They are lined with a 3D metallic shield that block the IR wavelengths commonly used for fault injection. This part of the structure is fabricated using standard TSV last process steps. These cavities are then corked with a polymer so that RDL-like metallic serpentines connected to TSVs can meander all over the protected area. This constitutes the active part of the shield, since the integrity of the serpentines can be controlled by measuring their electrical resistance. Finally the structure is covered with a thick protection layer with specific properties: it is FIB-resistant and fully opaque to IR. In order to evaluate the efficiency of the countermeasures, a test vehicle has been designed and fabricated with metal pads on one side and with the protection structure on the other side. The backside process was done using a glass carrier in order to handle the wafers after thinning below 200μm. After debonding, the wafers were tested and singulated before being hacked. A realistic scenario of physical attacks will be presented together with the physical, optical and electrical characterizations after the different attacks including (P)FIB ablation, micro-milling, chemical etching and laser illumination. We will conclude on the interest of such a structure for IoT or other applications that require protecting confidential data.

Author(s):  
J. V. Maskowitz ◽  
W. E. Rhoden ◽  
D. R. Kitchen ◽  
R. E. Omlor ◽  
P. F. Lloyd

The fabrication of the aluminum bridge test vehicle for use in the crystallographic studies of electromigration involves several photolithographic processes, some common, while others quite unique. It is most important to start with a clean wafer of known orientation. The wafers used are 7 mil thick boron doped silicon. The diameter of the wafer is 1.5 inches with a resistivity of 10-20 ohm-cm. The crystallographic orientation is (111).Initial attempts were made to both drill and laser holes in the silicon wafers then back fill with photoresist or mounting wax. A diamond tipped dentist burr was used to successfully drill holes in the wafer. This proved unacceptable in that the perimeter of the hole was cracked and chipped. Additionally, the minimum size hole realizable was > 300 μm. The drilled holes could not be arrayed on the wafer to any extent because the wafer would not stand up to the stress of multiple drilling.


Author(s):  
T. Kiyan ◽  
C. Boit ◽  
C. Brillert

Abstract In this paper, a methodology based upon laser stimulation and a comparison of continuous wave and pulsed laser operation will be presented that localizes the fault relevant sites in a fully functional scan chain cell. The technique uses a laser incident from the backside to inject soft faults into internal nodes of a master-slave scan flip-flop in consequence of localized photocurrent. Depending on the illuminated type of the transistors (n- or p-type), injection of a logic ‘0’ or ‘1’ into the master or the slave stage of a flip-flop takes place. The laser pulse is externally triggered and can easily be shifted to various time slots in reference to clock and scan pattern. This feature of the laser diode allows triggering the laser pulse on the rising or the falling edge of the clock. Therefore, it is possible to choose the stage of the flip-flop in which the fault injection should occur. It is also demonstrated that the technique is able to identify the most sensitive signal condition for fault injection with a better time resolution than the pulse width of the laser, a significant improvement for failure analysis of integrated circuits.


Author(s):  
Anees Banu

When it comes to preventing unauthorised access to, destruction of, or inspection of confidential data, information security has always been a major factor. Multimedia information is now used in every field throughout the world. The confidential information that is used in these areas must be kept secure. There are a variety of methods for keeping data secure. One of these is steganography, which is concealing information within other data into a format that the cover information remains unchanged. Cryptography, an encryption process that scrambles data into a written form that is sometimes referred to as a hash, is an auxiliary approach for securing information. Steganography and cryptography each have their own set of benefits and drawbacks. Even though both technologies give security, it is usually a good practise to combine Cryptographic algorithms to create additional layers of security. When cryptographic with steganography are combined, a multi-layer security paradigm is created. The proposed work's main goal is to add an additional layer of protection by using cryptography and steganography to encrypt and embed secret data conveyed across an insecure channel.


Author(s):  
Rafael Vargas-Bernal ◽  
Gabriel Herrera-Pérez ◽  
Margarita Tecpoyotl-Torres

Since its discovery in 1991 and 2004, carbon nanotubes (CNTs) by Sumio Iijima, and graphene by Andre Geim and Konstantin Novoselov in 2004, these materials have been extensively studied around the world. Both materials have electronic, thermal, magnetic, optical, chemical, and mechanical extraordinary properties. International Technology Roadmap for Semiconductors (ITRS) has predicted that these nanomaterials are potential replacements of the conventional materials used in the manufacture of integrated circuits. Two of the technological aspects that both materials share and have reduced their extensive use are processing and dispersion required to homogenize the electrical properties of the materials based on them. Fortunately, these problems are being solved thanks to the ongoing investigation, and in a short time the materials used in today's electronics industry will be replaced by devices based on these novel materials. The impact of the applications of both materials in the electronics industry, as well as future trends in the following decades are discussed in this paper.


2019 ◽  
pp. 6-11
Author(s):  
Kristina Guzhakovskaya ◽  
Yuriy Umnitsyn

The paper considers Global System for Mobile Communications, which plays the important role in contemporary society and carries new forms of dialog in the modern world. It is shown, that GSM-nets play two roles: firstly, they serve as communication tools for people who are in any point of world, and secondly, they can be used as tools for confidential data theft due to the old technology for telephone exchange setting, created as early as in the 1970s. Attacks using SS7 are often executed by hackers. After all, the attacker does not have to be close to the subscriber, and the attack can be made from anywhere on the planet. Therefore, to calculate the attacker is almost impossible, through this vulnerability can be hacked through almost any phone in the world. It will not be difficult to eavesdrop on conversations, intercept SMS, get access to the mobile Bank, social networks because of the vulnerability in the SS7 telephone infrastructure, through which service commands of cellular networks are transmitted. Due to the fact that the vulnerability with the Protocol SS7 is on the side of the operator, protection from such an attack is impossible. Until mobile operators are able to abandon this technology, this threat in the field of information security will remain relevant.


Impact ◽  
2020 ◽  
Vol 2020 (1) ◽  
pp. 9-11
Author(s):  
Nobukazu Takai

The 21st century has given rise to a digital world which has significantly impacted on the ways in which humans go about their everyday lives. From being able to speak with whomever you want, whenever you want, wherever you are on your smartphone, to tapping away on your laptop, through to spending hours each day on the internet, the world we live in is firmly digital and it now shapes the way we experience life. When it comes to circuits, analog still has a hugely important role to play. Circuit designer Associate Professor Nobukazu Takai is leading a team of researchers who are applying machine learning to analog circuit design. They are the first team to do this anywhere in the world and, using their method, computers are able to learn how to improve their own circuit specifications.


Author(s):  
Sharath Kumar Y. N. ◽  
Dinesha P.

Designing VLSI digital circuits is challenging tasks because of testing the circuits concerning design time. The reliability and productivity of digital integrated circuits are primarily affected by the defects in the manufacturing process or systems. If the defects are more in the systems, which leads the fault in the systems. The fault tolerant systems are necessary to overcome the faults in the VLSI digital circuits. In this research article, an asynchronous circuits based an effective transient fault injection (TFI) and fault tolerant system (FTS) are modelled. The TFI system generates the faults based on BMA based LFSR with faulty logic insertion and one hot encoded register. The BMA based LFSR reduces the hardware complexity with less power consumption on-chip than standard LFSR method. The FTS uses triple mode redundancy (TMR) based majority voter logic (MVL) to tolerant the faults for asynchronous circuits. The benchmarked 74X-series circuits are considered as an asynchronous circuit for TMR logic. The TFI-FTS module is modeled using Verilog-HDL on Xilinx-ISE and synthesized on hardware platform. The Performance parameters are tabulated for TFI-FTS based asynchronous circuits. The performance of TFI-FTS Module is analyzed with 100% fault coverage. The fault coverage is validated using functional simulation of each asynchronous circuit with fault injection in TFI-FTS Module.


Author(s):  
Jason Yapri ◽  
Rinkel Hananto

The term “hacker” has been spread around the world and has always been considered as a threat when we use the internet. We often hear hackers deface websites’ contents and break into system to steal private and confidential information, such as account’s username and password, credit card numbers and others. This is definitely an unethical behavior of irresponsible people who mostly aims to gain profit. However the term hacker, on the contrary actually originates from an expert computer technicians who tries to access the system to debug and fix security problems of the system. Nowadays there are dozens of websites out there and some of those websites have low level of security. Hacker can easily break through their system and steal their private confidential data but just because these websites have low level security, that doesn’t mean that it is ethical to break into someone’s system and read their data. It goes the same when someone entering other people’s house because the door was left open by the owner. As web development grows rapidly, security has become an essential part to make the website more secure and reliable. This is when a group of people decided to make a collaborative project on the implementation of SSL (Secure Socket Layer) and TLS (Transport Layer Security) that is available to be used by everyone. This project is called as OpenSSl and has been used by most of the websites in the internet today. What if this OpenSSL, which has been trusted and implemented by 2/3rd of the websites all around the world can be breached? Definitely it will attract dozens of hackers all around the world to do something unimaginably dangerous.


Sign in / Sign up

Export Citation Format

Share Document