SALSy: Security-Aware Layout Synthesis

08/11/2023
by   Mohammad Eslami, et al.
0

Integrated Circuits (ICs) are the target of diverse attacks during their lifetime. Fabrication-time attacks, such as the insertion of Hardware Trojans, can give an adversary access to privileged data and/or the means to corrupt the IC's internal computation. Post-fabrication attacks, where the end-user takes a malicious role, also attempt to obtain privileged information through means such as fault injection and probing. Taking these threats into account and at the same time, this paper proposes a methodology for Security-Aware Layout Synthesis (SALSy), such that ICs can be designed with security in mind in the same manner as power-performance-area (PPA) metrics are considered today, a concept known as security closure. Furthermore, the trade-offs between PPA and security are considered and a chip is fabricated in a 65nm CMOS commercial technology for validation purposes - a feature not seen in previous research on security closure. Measurements on the fabricated ICs indicate that SALSy promotes a modest increase in power in order to achieve significantly improved security metrics.

READ FULL TEXT

page 4

page 6

page 7

page 8

page 9

page 10

page 13

research
11/15/2022

Security Closure of IC Layouts Against Hardware Trojans

Due to cost benefits, supply chains of integrated circuits (ICs) are lar...
research
10/11/2021

From FPGAs to Obfuscated eASICs: Design and Security Trade-offs

Threats associated with the untrusted fabrication of integrated circuits...
research
01/09/2020

Voltage regulator assisted lightweight countermeasure against fault injection attacks

The impeccable design of sensitive and cryptographic circuits (CC) again...
research
09/11/2023

Classification of Quantum Computer Fault Injection Attacks

The rapid growth of interest in quantum computing has brought about the ...
research
01/27/2020

Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA

Modern electronic systems become evermore complex, yet remain modular, w...
research
08/30/2021

Security For System-On-Chip (SoC) Using Neural Networks

With the growth of embedded systems, VLSI design phases complexity and c...
research
12/06/2021

Hardware Trojan Insertion in Finalized Layouts: a Silicon Demonstration

Owning a high-end semiconductor foundry is a luxury very few companies c...

Please sign up or login with your details

Forgot password? Click here to reset