Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3195970.3196100acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Raise your game for split manufacturing: restoring the true functionality through BEOL

Published: 24 June 2018 Publication History

Abstract

Split manufacturing (SM) seeks to protect against piracy of intellectual property (IP) in chip designs. Here we propose a scheme to manipulate both placement and routing in an intertwined manner, thereby increasing the resilience of SM layouts. Key stages of our scheme are to (partially) randomize a design, place and route the erroneous netlist, and restore the original design by re-routing the BEOL. Based on state-of-the-art proximity attacks, we demonstrate that our scheme notably excels over the prior art (i.e., 0% correct connection rates). Our scheme induces controllable PPA overheads and lowers commercial cost (the latter by splitting at higher layers).

References

[1]
C. McCants, "Trusted integrated chips (TIC)," Intelligence Advanced Research Projects Activity (IARPA), 2011. {Online}. Available: https://www.iarpa.gov/index.php/research-programs/tic
[2]
D. Forte, S. Bhunia, and M. M. Tehranipoor, Eds., Hardware Protection through Obfuscation. Springer, 2017.
[3]
J. Rajendran, O. Sinanoglu, and R. Karri, "Is split manufacturing secure?" in Proc. Des. Autom. Test Europe, 2013, pp. 1259--1264.
[4]
B. Hill et al., "A split-foundry asynchronous FPGA," in Proc. Cust. Integ. Circ. Conf., 2013, pp. 1--4.
[5]
Y. Wang, P. Chen, J. Hu, and J. J. Rajendran, "The cat and mouse in split manufacturing," in Proc. Des. Autom. Conf., 2016, pp. 165:1--165:6.
[6]
J. Magaña, D. Shi, and A. Davoodi, "Are proximity attacks a threat to the security of split manufacturing of integrated circuits?" in Proc. Int. Conf. Comp.-Aided Des., 2016, pp. 90:1--90:7.
[7]
J. Magaña, D. Shi, J. Melchert, and A. Davoodi, "Are proximity attacks a threat to the security of split manufacturing of integrated circuits?" Trans. VLSI Syst., vol. 25, no. 12, pp. 3406--3419, 2017.
[8]
A. Sengupta et al., "Rethinking split manufacturing: An information-theoretic approach with secure layout techniques," in Proc. Int. Conf. Comp.-Aided Des., 2017, pp. 329--336.
[9]
L. Feng et al., "Making split fabrication synergistically secure and manufacturable," in Proc. Int. Conf. Comp.-Aided Des., 2017, pp. 313--320.
[10]
Y. Wang, T. Cao, J. Hu, and J. J. Rajendran, "Front-end-of-line attacks in split manufacturing," in Proc. Int. Conf. Comp.-Aided Des., 2017, pp. 321--328.
[11]
(2018) DfX Lab, NYUAD. {Online}. Available: http://sites.nyuad.nyu.edu/dfx/research-topics/design-for-trust-split-manufacturing/
[12]
Y. Wang, P. Chen, J. Hu, and J. Rajendran, "Routing perturbation for enhanced security in split manufacturing," in Proc. Asia South Pac. Des. Autom. Conf., 2017, pp. 605--610.
[13]
K. Xiao, D. Forte, and M. M. Tehranipoor, "Efficient and secure split manufacturing via obfuscated built-in self-authentication," in Proc. Int. Symp. Hardw.-Orient. Sec. Trust, 2015, pp. 14--19.
[14]
N. Viswanathan et al., "The ISPD-2011 routability-driven placement contest and benchmark suite," in Proc. Int. Symp. Phys. Des., 2011, pp. 141--146.
[15]
A. B. Kahng, H. Lee, and J. Li, "Horizontal benchmark extension for improved assessment of physical CAD research," in Proc. Great Lakes Symp. VLSI, 2014, pp. 27--32. {Online}. Available: http://vlsicad.ucsd.edu/A2A/
[16]
(2011) NanGate FreePDK45 Open Cell Library. Nangate Inc. {Online}. Available: http://www.nangate.com/?page_id=2325

Cited By

View all
  • (2023)Polymorphic Primitives for Hardware SecurityDesign Automation and Applications for Emerging Reconfigurable Nanotechnologies10.1007/978-3-031-37924-6_7(145-174)Online publication date: 20-Jun-2023
  • (2022)A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOLCryptography10.3390/cryptography60200226:2(22)Online publication date: 5-May-2022
  • (2022) Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices IEEE Transactions on Emerging Topics in Computing10.1109/TETC.2020.299113410:1(137-156)Online publication date: 1-Jan-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '18: Proceedings of the 55th Annual Design Automation Conference
June 2018
1089 pages
ISBN:9781450357005
DOI:10.1145/3195970
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 June 2018

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

DAC '18
Sponsor:
DAC '18: The 55th Annual Design Automation Conference 2018
June 24 - 29, 2018
California, San Francisco

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)1
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Polymorphic Primitives for Hardware SecurityDesign Automation and Applications for Emerging Reconfigurable Nanotechnologies10.1007/978-3-031-37924-6_7(145-174)Online publication date: 20-Jun-2023
  • (2022)A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOLCryptography10.3390/cryptography60200226:2(22)Online publication date: 5-May-2022
  • (2022) Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices IEEE Transactions on Emerging Topics in Computing10.1109/TETC.2020.299113410:1(137-156)Online publication date: 1-Jan-2022
  • (2022)Concerted Wire Lifting: Enabling Secure and Cost-Effective Split ManufacturingIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2021.305637941:2(266-280)Online publication date: Feb-2022
  • (2021)Games, Dollars, Splits: A Game-Theoretic Analysis of Split ManufacturingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.312282716(5077-5092)Online publication date: 2021
  • (2021) UNSAIL : Thwarting Oracle-Less Machine Learning Attacks on Logic Locking IEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.305757616(2508-2523)Online publication date: 2021
  • (2021)A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical InterconnectsIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2019.29335729:4(1815-1834)Online publication date: 1-Oct-2021
  • (2021)Deep Learning Analysis for Split-Manufactured Layouts With Routing PerturbationIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2020.303729740:10(1995-2008)Online publication date: Oct-2021
  • (2021)HW2VEC: a Graph Learning Tool for Automating Hardware Security2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST49136.2021.9702281(13-23)Online publication date: 12-Dec-2021
  • (2021)GNN4IP: Graph Neural Network for Hardware Intellectual Property Piracy Detection2021 58th ACM/IEEE Design Automation Conference (DAC)10.1109/DAC18074.2021.9586150(217-222)Online publication date: 5-Dec-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media