Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3240765.3240784guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs

Published: 05 November 2018 Publication History

Abstract

With the globalization of manufacturing and supply chains, ensuring the security and trustworthiness of ICs has become an urgent challenge. Split manufacturing (SM) and layout camouflaging (LC) are promising techniques to protect the intellectual property (IP) of ICs from malicious entities during and after manufacturing (i.e., from untrusted foundries and reverse-engineering by end-users). In this paper, we strive for “the best of both worlds,” that is of SM and LC. To do so, we extend both techniques towards 3D integration, an up-and-coming design and manufacturing paradigm based on stacking and interconnecting of multiple chips/dies/tiers. Initially, we review prior art and their limitations. We also put forward a novel, practical threat model of IP piracy which is in line with the business models of present-day design houses. Next, we discuss how 3D integration is a naturally strong match to combine SM and LC. We propose a security-driven CAD and manufacturing flow for face-to-face (F2F) 3D ICs, along with obfuscation of interconnects. Based on this CAD flow, we conduct comprehensive experiments on DRC-clean layouts. Strengthened by an extensive security analysis (also based on a novel attack to recover obfuscated F2F interconnects), we argue that entering the next, third dimension is eminent for effective and efficient IP protection.

References

[1]
P. Kocher et al., “Spectre attacks: Exploiting speculative execution,” in Proc. S&P, 2019.
[2]
L. Lerman et al., “Start simple and then refine: Bias-variance decomposition as a diagnosis tool for leakage profiling,” Trans. Comp., vol. 67, no. 2, pp. 268–283, 2018.
[3]
S. Bhunia, S. Ray, and S. Sur-Kolay, Eds., Fundamentals of IP and SoC Security. Springer, 2017.
[4]
M. Yasin et al., “Provably-secure logic locking: From theory to practice,” in Proc. CCS, 2017, pp. 1601–1618.
[5]
K. Shamsi et al., “On the approximation resiliency of logic locking and IC camouflaging schemes,” Trans. IFS, 2018.
[6]
J. Rajendran et al., “Security analysis of integrated circuit camouflaging,” in Proc. CCS, 2013, pp. 709–720.
[7]
X. Wang et al., “Secure and low-overhead circuit obfuscation technique with multiplexers,” in Proc. GLSVLSI, 2016, pp. 133–136.
[8]
M.I.M. Collantes, M.E. Massad, and S. Garg, “Threshold-dependent camouflaged cells to secure circuits against reverse engineering attacks,” in Proc. ISVLSI, 2016, pp. 443–448.
[9]
I.R. Nirmala et al., “A novel threshold voltage defined switch for circuit camouflaging,” in Proc. ETS, 2016, pp. 1–2.
[10]
N.E.C. Akkaya, B. Erbagci, and K. Mai, “A secure camouflaged logic family using post-manufacturing programming with a 3.6GHz adder prototype in 65nm CMOS at 1V nominal VDD,” in Proc. ISSCC, 2018, pp. 128–130.
[11]
S. Chen et al., “Chip-level anti-reverse engineering using transformable interconnects,” in Proc. DFT, 2015, pp. 109–114.
[12]
S. Patnaik et al., “Obfuscating the interconnects: Low-cost and resilient full-chip layout camouflaging,” in Proc. ICCAD, 2017, pp. 41–48.
[13]
S. Patnaik et al., “Advancing hardware security using polymorphic and stochastic spin-hall effect devices,” in Proc. DATE, 2018, pp. 97–102.
[14]
J. Rajendran, O. Sinanoglu, and R. Karri, “Is split manufacturing secure?” in Proc. DATE, 2013, pp. 1259–1264.
[15]
Y. Wang et al., “Routing perturbation for enhanced security in split manufacturing,” in Proc. ASPDAC, 2017, pp. 605–610.
[16]
S. Patnaik et al., “Concerted wire lifting: Enabling secure and cost-effective split manufacturing,” in Proc. ASPDAC, 2018, pp. 251–258.
[17]
S. Patnaik et al., “Raise your game for split manufacturing: Restoring the true functionality through BEOL,” in Proc. DAC, 2018, pp. 140:1–140:6.
[18]
Y. Wang et al., “The cat and mouse in split manufacturing,” Trans. VLSI, vol. 26, no. 5, pp. 805–817, 2018.
[19]
J. Magaña et al., “Are proximity attacks a threat to the security of split manufacturing of integrated circuits?” Trans. VLSI, vol. 25, no. 12, 2017.
[20]
A. Sengupta et al., “Rethinking split manufacturing: An information-theoretic approach with secure layout techniques,” in Proc. ICCAD, 2017, pp. 329–336.
[21]
J. Knechtel and J. Lienig, “Physical design automation for 3D chip stacks - challenges and solutions,” in Proc. ISPD, 2016, pp. 3–10.
[22]
I.A.M. Elfadel and G. Fettweis, Eds., 3D Stacked Chips - From Emerging Processes to Heterogeneous Systems. Springer, 2016.
[23]
Y. Peng et al., “Parasitic extraction for heterogeneous face-to-face bonded 3-D ICs,” Trans. CPMT, vol. 7, no. 6, pp. 912–924, 2017.
[24]
M. Jung et al., “On enhancing power benefits in 3D ICs: Block folding and bonding styles perspective,” in Proc. DAC, 2014, pp. 1–6.
[25]
D.H. Kim et al., “3D-MAPS: 3D massively parallel processor with stacked memory,” in Proc. ISSCC, 2012, pp. 188–190.
[26]
R. Radojcic, More-than-Moore 2.5D and 3D SiP Integration. Springer, 2017.
[27]
J. Knechtel et al., “Large-scale 3D chips: Challenges and solutions for design automation, testing, and trustworthy integration,” Trans. SLDM, vol. 10, pp. 45–62, 2017.
[28]
K. Chang et al., “Cascade2D: A design-aware partitioning approach to monolithic 3D IC with 2D commercial tools,” in Proc. ICCAD, 2016, pp. 130:1–130:8.
[29]
B.W. Ku, K. Chang, and S.K. Lim, “Compact-2D: A physical design methodology to build commercial-quality face-to-face-bonded 3D ICs,” in Proc. ISPD, 2018, pp. 90–97.
[30]
Y. Peng et al., “Thermal impact study of block folding and face-to-face bonding in 3D IC,” in Proc. IITC, 2015, pp. 331–334.
[31]
Tezzaron Semiconductor, “3D-I Cs and integrated circuit security,” Tezzaron Semiconductor, Tech. Rep., 2008. [Online]. Available: http://tezzaron.com/media/3D-ICs_and_Integrated_Circuit_Security.pdf
[32]
J. Dofe et al., “Security threats and countermeasures in three-dimensional integrated circuits,” in Proc. GLSVLSI, 2017, pp. 321–326.
[33]
P. Gu et al., “Leveraging 3D technologies for hardware security: Opportunities and challenges,” in Proc. GLSVLSI, 2016, pp. 347–352.
[34]
F. Imeson et al., “Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation,” in Proc. USENIX, 2013, pp. 495–510.
[35]
Y. Xie, C. Bao, and A. Srivastava, “Security-aware 2.5D integrated circuit design flow against hardware IP piracy,” Computer, vol. 50, no. 5, pp. 62–71, 2017.
[36]
J. Valamehr et al., “A 3-D split manufacturing approach to trustworthy system development,” Trans. CAD, vol. 32, no. 4, pp. 611–615, 2013.
[37]
(2017) FreePDK: Unleashing VLSI to the Masses. Oklahoma State University. [Online]. Available: https://vlsiarch.ecen.okstate.edu/flows/
[38]
S. Borkar, “Design challenges of technology scaling,” Micro, vol. 19, no. 4, pp. 23–29, 1999.
[39]
J.-M. Lin, P.-Y. Chiu, and Y.-F. Chang, “SAINT: Handling module folding and alignment in fixed-outline floorplans for 3D ICs,” in Proc. ICCAD, 2016.
[40]
M. Jung et al., “Design methodologies for low-power 3-D ICs with advanced tier partitioning,” Trans. VLSI, vol. 25, no. 7, 2017.
[41]
R.P. Cocchi et al., “Circuit camouflage integration for hardware IP protection,” in Proc. DAC, 2014, pp. 1–5.
[42]
A. Vijayakumar et al., “Physical design obfuscation of hardware: A comprehensive investigation of device- and logic-level techniques,” Trans. IFS, vol. 12, pp. 64–77, 2017.
[43]
S.-W. Hwang et al., “A physically transient form of silicon electronics,” Science, vol. 337, no. 6102, pp. 1640–1644, 2012.
[44]
(2011) NanGate FreePDK45 Open Cell Library. Nangate Inc. [Online]. Available: http://www.nangate.com/?page_id=2325
[46]
P. Subramanyan, S. Ray, and S. Malik, “Evaluating the security of logic encryption algorithms,” in Proc. HOST, 2015, pp. 137–143.
[47]
J. Jang and S. Ghosh, “A novel interconnect camouflaging technique using transistor threshold voltage,” arXiv, vol., 2017.
[48]
J. Dofe et al., “Transistor-level camouflaged logic locking method for monolithic 3D IC security,” in Proc. AHOST, 2016, pp. 1–6.
[49]
C. Yan et al., “Hardware-efficient logic camouflaging for monolithic 3D ICs,” Trans. CS, vol. 65, no. 6, pp. 799–803, 2018.
[50]
M.E. Massad, S. Garg, and M.V. Tripunitara, “Integrated circuit (IC) decamou-flaging: Reverse engineering camouflaged ICs within minutes,” in Proc. NDSS, 2015, pp. 1–14.
[51]
C. Yu et al., “Incremental SAT-based reverse engineering of camouflaged logic circuits,” Trans. CAD, vol. 36, no. 10, pp. 1647–1659, 2017.

Cited By

View all
  • (2023)On the Security of Sequential Logic Locking Against Oracle-Guided AttacksIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.325342842:11(3628-3641)Online publication date: Nov-2023
  • (2022) Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices IEEE Transactions on Emerging Topics in Computing10.1109/TETC.2020.299113410:1(137-156)Online publication date: 1-Jan-2022
  • (2022)Concerted Wire Lifting: Enabling Secure and Cost-Effective Split ManufacturingIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2021.305637941:2(266-280)Online publication date: Feb-2022
  • Show More Cited By

Index Terms

  1. Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image Guide Proceedings
          2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
          Nov 2018
          939 pages

          Publisher

          IEEE Press

          Publication History

          Published: 05 November 2018

          Permissions

          Request permissions for this article.

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 12 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2023)On the Security of Sequential Logic Locking Against Oracle-Guided AttacksIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.325342842:11(3628-3641)Online publication date: Nov-2023
          • (2022) Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices IEEE Transactions on Emerging Topics in Computing10.1109/TETC.2020.299113410:1(137-156)Online publication date: 1-Jan-2022
          • (2022)Concerted Wire Lifting: Enabling Secure and Cost-Effective Split ManufacturingIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2021.305637941:2(266-280)Online publication date: Feb-2022
          • (2021)Hardware Security for and beyond CMOS TechnologyProceedings of the 2021 International Symposium on Physical Design10.1145/3439706.3446902(115-126)Online publication date: 22-Mar-2021
          • (2021)A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical InterconnectsIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2019.29335729:4(1815-1834)Online publication date: 1-Oct-2021
          • (2021)Holistic Chiplet–Package Co-Optimization for Agile Custom 2.5-D DesignIEEE Transactions on Components, Packaging and Manufacturing Technology10.1109/TCPMT.2021.306972411:5(715-726)Online publication date: May-2021
          • (2021)An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design ToolsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2020.304797640:6(1010-1038)Online publication date: Jun-2021
          • (2021)Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic Encryption2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST49136.2021.9702267(281-291)Online publication date: 12-Dec-2021
          • (2021)Defenses Against Satisfiability Based AttacksSplit Manufacturing of Integrated Circuits for Hardware Security and Trust10.1007/978-3-030-73445-9_5(137-169)Online publication date: 13-Mar-2021
          • (2021)Securing 3D NoCs from Hardware Trojan AttacksNetwork-on-Chip Security and Privacy10.1007/978-3-030-69131-8_17(461-479)Online publication date: 4-May-2021
          • Show More Cited By

          View Options

          View options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media