EVHA: Explainable Vision System for Hardware Testing and Assurance – An Overview

07/20/2022
by   Md Mahfuz Al Hasan, et al.
0

Due to the ever-growing demands for electronic chips in different sectors the semiconductor companies have been mandated to offshore their manufacturing processes. This unwanted matter has made security and trustworthiness of their fabricated chips concerning and caused creation of hardware attacks. In this condition, different entities in the semiconductor supply chain can act maliciously and execute an attack on the design computing layers, from devices to systems. Our attack is a hardware Trojan that is inserted during mask generation/fabrication in an untrusted foundry. The Trojan leaves a footprint in the fabricated through addition, deletion, or change of design cells. In order to tackle this problem, we propose Explainable Vision System for Hardware Testing and Assurance (EVHA) in this work that can detect the smallest possible change to a design in a low-cost, accurate, and fast manner. The inputs to this system are Scanning Electron Microscopy (SEM) images acquired from the Integrated Circuits (ICs) under examination. The system output is determination of IC status in terms of having any defect and/or hardware Trojan through addition, deletion, or change in the design cells at the cell-level. This article provides an overview on the design, development, implementation, and analysis of our defense system.

READ FULL TEXT

page 6

page 9

page 10

page 12

page 17

page 19

page 20

page 21

research
09/16/2019

TAAL: Tampering Attack on Any Key-based Logic Locked Circuits

Due to the globalization of semiconductor manufacturing and test process...
research
08/18/2022

Reverse Engineering of Integrated Circuits: Tools and Techniques

Consumer and defense systems demanded design and manufacturing of electr...
research
05/15/2019

Threats on Logic Locking: A Decade Later

To reduce the cost of ICs and to meet the market's demand, a considerabl...
research
07/26/2021

HW2VEC: A Graph Learning Tool for Automating Hardware Security

The time-to-market pressure and continuous growing complexity of hardwar...
research
08/25/2023

ExD: Explainable Deletion

This paper focuses on a critical yet often overlooked aspect of data in ...
research
01/27/2020

Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA

Modern electronic systems become evermore complex, yet remain modular, w...
research
12/06/2021

Hardware Trojan Insertion in Finalized Layouts: a Silicon Demonstration

Owning a high-end semiconductor foundry is a luxury very few companies c...

Please sign up or login with your details

Forgot password? Click here to reset