A method to prevent hardware Trojans limiting access to layout resources. (September 2021)
- Record Type:
- Journal Article
- Title:
- A method to prevent hardware Trojans limiting access to layout resources. (September 2021)
- Main Title:
- A method to prevent hardware Trojans limiting access to layout resources
- Authors:
- Supon, Tareq Muhammad
Seyedbarhagh, Mahsasadat
Rashidzadeh, Rashid
Muscedere, Roberto - Abstract:
- Abstract: The advancement of Integrated Circuit (IC) technology has encouraged the IC industries to go fabless and outsource the fabrication to other companies, due to the cost associated with installing a new facility and design to production time limitations. It has also introduced an adverse effect on hardware security, known as Hardware Trojan (HT), which is very difficult to detect due to low signal-to-noise (SNR) ratio. As a result, Hardware Trojan has become a serious concern for the semiconductor industry. Even though researchers have proposed various solutions and design methods to address these security concerns, due to the wide range of Trojans, a comprehensive solution to counteract these security threats is yet far from reach. For now, only specific solutions for certain Trojan detection have been presented. Different Trojan prevention methods have also been explored with optimal hardware security in mind. In this article, a novel Design-For-Security (DFS) idea for HT prevention has been presented where the unused polysilicon layer is occupied using minimum feature wires and thus deprive the attackers of the resources needed for Trojan routing. The main advantage of this technique is that it prevents an attacker from inserting any active layer in the silicon substrate, which is a fundamental component of any CMOS device. Since the active layer connects directly to any polysilicon layer, if the unused polysilicon layer is covered with minimum feature wire, it isAbstract: The advancement of Integrated Circuit (IC) technology has encouraged the IC industries to go fabless and outsource the fabrication to other companies, due to the cost associated with installing a new facility and design to production time limitations. It has also introduced an adverse effect on hardware security, known as Hardware Trojan (HT), which is very difficult to detect due to low signal-to-noise (SNR) ratio. As a result, Hardware Trojan has become a serious concern for the semiconductor industry. Even though researchers have proposed various solutions and design methods to address these security concerns, due to the wide range of Trojans, a comprehensive solution to counteract these security threats is yet far from reach. For now, only specific solutions for certain Trojan detection have been presented. Different Trojan prevention methods have also been explored with optimal hardware security in mind. In this article, a novel Design-For-Security (DFS) idea for HT prevention has been presented where the unused polysilicon layer is occupied using minimum feature wires and thus deprive the attackers of the resources needed for Trojan routing. The main advantage of this technique is that it prevents an attacker from inserting any active layer in the silicon substrate, which is a fundamental component of any CMOS device. Since the active layer connects directly to any polysilicon layer, if the unused polysilicon layer is covered with minimum feature wire, it is impossible for attackers to rout any extra circuitry without removing a portion of the polysilicon wire. A readout circuit is used to determine the delay produced by the added polysilicon wires, which in turn makes sure that the polysilicon layer is intact, and it has not been tampered with. A unique signature is also obtained using those polysilicon wires as probes to induce signal from the main circuit. Any modification to either the circuit or the polysilicon probe will reflect a change in the signature. Simulation results indicate that with a proper design, even the insertion of a single inverter can be detected. This technique can ensure 100% utilization of the empty spaces in the polysilicon layer. Highlights: A solution to counter all Hardware Trojans is far from reach due to their wide range. The best solution is to deprive attackers of space to insert any Hardware Trojan. Attackers need access to substrate and poly layers to form active layers for trojans. Access can be denied by filling 100% of poly as it connects directly to active layer. The best way to fill poly layer is by wires as those can be used to detect Trojans. … (more)
- Is Part Of:
- Microelectronics and reliability. Volume 124(2021)
- Journal:
- Microelectronics and reliability
- Issue:
- Volume 124(2021)
- Issue Display:
- Volume 124, Issue 2021 (2021)
- Year:
- 2021
- Volume:
- 124
- Issue:
- 2021
- Issue Sort Value:
- 2021-0124-2021-0000
- Page Start:
- Page End:
- Publication Date:
- 2021-09
- Subjects:
- Hardware Trojan prevention -- Hardware security -- Hardware Trojan detection -- Microchip authentication -- Hardware reliability -- Layout filling
Electronic apparatus and appliances -- Reliability -- Periodicals
Miniature electronic equipment -- Periodicals
Appareils électroniques -- Fiabilité -- Périodiques
Équipement électronique miniaturisé -- Périodiques
Electronic apparatus and appliances -- Reliability
Miniature electronic equipment
Periodicals
621.3815 - Journal URLs:
- http://www.sciencedirect.com/science/journal/00262714 ↗
http://www.elsevier.com/journals ↗
http://www.elsevier.com/homepage/elecserv.htt ↗ - DOI:
- 10.1016/j.microrel.2021.114212 ↗
- Languages:
- English
- ISSNs:
- 0026-2714
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - 5758.979000
British Library DSC - BLDSS-3PM
British Library HMNTS - ELD Digital store - Ingest File:
- 18861.xml