Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/3199700.3199744acmconferencesArticle/Chapter ViewAbstractPublication PagesiccadConference Proceedingsconference-collections
research-article

Rethinking split manufacturing: an information-theoretic approach with secure layout techniques

Published: 13 November 2017 Publication History

Abstract

Split manufacturing is a promising technique to defend against fab-based malicious activities such as IP piracy, overbuilding, and insertion of hardware Trojans. However, a network flow-based proximity attack, proposed by Wang et al. (DAC'16) [1], has demonstrated that most prior art on split manufacturing is highly vulnerable. Here in this work, we present two practical layout techniques towards secure split manufacturing: (i) gate-level graph coloring and (ii) clustering of same-type gates. Our approach shows promising results against the advanced proximity attack, lowering its success rate by 5.27x, 3.19x, and 1.73x on average compared to the unprotected layouts when splitting at metal layers M1, M2, and M3, respectively. Also, it largely outperforms previous defense efforts; we observe on average 8x higher resilience when compared to representative prior art. At the same time, extensive simulations on ISCAS'85 and MCNC benchmarks reveal that our techniques incur an acceptable layout overhead. Apart from this empirical study, we provide---for the first time---a theoretical framework for quantifying the layout-level resilience against any proximity-induced information leakage. Towards this end, we leverage the notion of mutual information and provide extensive results to validate our model.

References

[1]
Y. Wang, P. Chen, J. Hu, and J. J. Rajendran, "The cat and mouse in split manufacturing," in Proc. Des. Autom. Conf., 2016, pp. 165:1--165:6.
[2]
R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, "Trustworthy hardware: Identifying and classifying hardware trojans," Computer, vol. 43, no. 10, pp. 39--46, 2010.
[3]
"iPhone 5 A6 SoC reverse engineered, reveals rare hand-made custom CPU, and tri-core GPU," 2012. {Online}. Available: http://www.extremetech.com/computing/136749-iphone-5-a6-soc-reverse-engineered-reveals-rare-hand-made-custom-cpu-and-a-tri-core-gpu
[4]
M. Rostami, F. Koushanfar, and R. Karri, "A primer on hardware security: Models, methods, and metrics," Proc. IEEE, vol. 102, no. 8, pp. 1283--1295, 2014.
[5]
"Innovation is at risk as semiconductor equipment and materials industry loses up to $4 billion annually due to IP infringement," 2008. {Online}. Available: http://www.marketwired.com/press-release/innovation-is-risk-as-semiconductor-equipment-materials-industry-loses-up-4-billion-850034.htm
[6]
"Trusted integrated chips (TIC) program," Intelligence Advanced Research Projects Activity, 2011. {Online}. Available: https://www.fbo.gov/utils/view?id=b8be3d2c5d5babbdffc6975c370247a6
[7]
K. Vaidyanathan et al., "Building trusted ICs using split fabrication," in Proc. Int. Symp. Hardw.-Orient. Sec. Trust, 2014, pp. 1--6.
[8]
K. Vaidyanathan et al., "Efficient and secure intellectual property (IP) design with split fabrication," in Proc. Int. Symp. Hardw.-Orient. Sec. Trust, 2014, pp. 13--18.
[9]
K. Vaidyanathan, B. P. Das, and L. Pileggi, "Detecting reliability attacks during split fabrication using test-only BEOL stack," in Proc. Des. Autom. Conf., 2014, pp. 1--6.
[10]
C. T. O. Otero et al., "Automatic obfuscated cell layout for trusted split-foundry design," in Proc. Int. Symp. Hardw.-Orient. Sec. Trust, 2015, pp. 56--61.
[11]
J. Rajendran, O. Sinanoglu, and R. Karri, "Is split manufacturing secure?" in Proc. Des. Autom. Test Europe, 2013, pp. 1259--1264.
[12]
M. Jagasivamani et al., "Split-fabrication obfuscation: Metrics and techniques," in Proc. Int. Symp. Hardw.-Orient. Sec. Trust, 2014, pp. 7--12.
[13]
Y. Wang, P. Chen, J. Hu, and J. Rajendran, "Routing perturbation for enhanced security in split manufacturing," in Proc. Asia South P. Des. Autom. Conf., 2017, pp. 605--610.
[14]
J. Magaña, D. Shi, and A. Davoodi, "Are proximity attacks a threat to the security of split manufacturing of integrated circuits?" in Proc. Int. Conf. Comp.-Aided Des., 2016, pp. 90:1--90:7.
[15]
F. Imeson, A. Emtenan, S. Garg, and M. V. Tripunitara, "Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation," in Proc. USENIX Sec. Symp., 2013, pp. 495--510.
[16]
B. Köpf and D. Basin, "An information-theoretic model for adaptive side-channel attacks," in Proc. Comp. Comm. Sec., 2007, pp. 286--296.
[17]
F.-X. Standaert, T. G. Malkin, and M. Yung, "A unified framework for the analysis of side-channel key recovery attacks," in Proc. Eurocrypt, 2009, pp. 443--461.
[18]
D. B. West, Introduction to Graph Theory, 2nd ed. Prentice Hall, 2000.
[19]
A. B. Kahng, J. Lienig, I. L. Markov, and J. Hu, VLSI Physical Design: From Graph Partitioning to Timing Closure. Springer, 2011.
[20]
"NanGate FreePDK45 Open Cell Library," 2011. {Online}. Available: http://www.nangate.com/?page_id=2325
[21]
R. S. Shelar and M. Patyra, "Impact of local interconnects on timing and power in a high performance microprocessor," Trans. Comp.-Aided Des. Integ. Circ. Sys., vol. 32, no. 10, pp. 1623--1627, 2013.

Cited By

View all
  • (2019)Protect Your Chip Design Intellectual PropertyProceedings of the International Conference on Omni-Layer Intelligent Systems10.1145/3312614.3312657(211-216)Online publication date: 5-May-2019
  • (2019)Layout recognition attacks on split manufacturingProceedings of the 24th Asia and South Pacific Design Automation Conference10.1145/3287624.3287698(45-50)Online publication date: 21-Jan-2019
  • (2018)Concerted wire liftingProceedings of the 23rd Asia and South Pacific Design Automation Conference10.5555/3201607.3201660(251-258)Online publication date: 22-Jan-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICCAD '17: Proceedings of the 36th International Conference on Computer-Aided Design
November 2017
1077 pages

Sponsors

In-Cooperation

  • IEEE-EDS: Electronic Devices Society

Publisher

IEEE Press

Publication History

Published: 13 November 2017

Check for updates

Qualifiers

  • Research-article

Conference

ICCAD '17
Sponsor:

Acceptance Rates

Overall Acceptance Rate 457 of 1,762 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Protect Your Chip Design Intellectual PropertyProceedings of the International Conference on Omni-Layer Intelligent Systems10.1145/3312614.3312657(211-216)Online publication date: 5-May-2019
  • (2019)Layout recognition attacks on split manufacturingProceedings of the 24th Asia and South Pacific Design Automation Conference10.1145/3287624.3287698(45-50)Online publication date: 21-Jan-2019
  • (2018)Concerted wire liftingProceedings of the 23rd Asia and South Pacific Design Automation Conference10.5555/3201607.3201660(251-258)Online publication date: 22-Jan-2018
  • (2018)Raise your game for split manufacturingProceedings of the 55th Annual Design Automation Conference10.1145/3195970.3196100(1-6)Online publication date: 24-Jun-2018
  • (2018)Analysis of security of split manufacturing using machine learningProceedings of the 55th Annual Design Automation Conference10.1145/3195970.3195991(1-6)Online publication date: 24-Jun-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media