Proceedings of the 51st Annual Design Automation Conference 2014
DOI: 10.1145/2593069.2593123
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…For example, Scanning Electron Microscopy (SEM) or Focused Ion Beam (FIB) [52] could be used to destructively delayer chips, and verify transistors and interconnects. Destructive stress tests may be used to detect reliability attacks (Appendix A) [48].…”
Section: A Destructive Vs Nondestructive Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, Scanning Electron Microscopy (SEM) or Focused Ion Beam (FIB) [52] could be used to destructively delayer chips, and verify transistors and interconnects. Destructive stress tests may be used to detect reliability attacks (Appendix A) [48].…”
Section: A Destructive Vs Nondestructive Methodsmentioning
confidence: 99%
“…However, split manufacturing does not provide Trojan detection by itself. Destructive stress tests on selected back-end-of-line stacks can detect reliability attacks [48]. Trusted monitor chips stacked on top of an untrusted chip using through-silicon vias (TSVs) may be used to actively detect attacks [49] or selected wires may be lifted (using TSVs) to a secure layer to obfuscate a design [106].…”
Section: B Tpad Vs Other Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…They applied their techniques in mult24and a5/1to present a statistical analysis of the performance yield when filling the standard cells in spared space in a complex digital design. The method of split manufacturing is further expanded to the application of reliable attack detection with test-only BEOL [14].…”
Section: Split Manufacturing In the Digital Domainmentioning
confidence: 99%
“…Even though the concept is straightforward, a successful implementation requires further research on various aspects, especially the balance between cost and security when the designer splits the layout into FEOL and BEOL. Analytical and experimental results have already been presented for digital circuits [8][9][10][11][12][13][14][15]. However, the analog/RF designs are rarely discussed when using split manufacturing, even though analog/RF circuits are more likely to be IP piracy victims than their digital counterparts.…”
Section: Introductionmentioning
confidence: 99%