2012 IEEE International Symposium on Hardware-Oriented Security and Trust 2012
DOI: 10.1109/hst.2012.6224333
|View full text |Cite
|
Sign up to set email alerts
|

Detection of probing attempts in secure ICs

Abstract: Physical attacks focus on extracting information from internal parts of IC's. One way to achieve this is by means of connecting probes to wires, so that the content of internal buses and registers can be revealed. Protection against this type of attacks exists, but usually is bulky and expensive, e.g. the shielding of secured areas. This paper presents a novel in-circuit countermeasure that is cheap and can easily be integrated in existing designs to detect probing attempts. It is based on a ring oscillator th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 37 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…The circuit only consists of a few gates and has a significantly lower area than other protection mechanisms, such as the PAD [7] or bus encryption.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…The circuit only consists of a few gates and has a significantly lower area than other protection mechanisms, such as the PAD [7] or bus encryption.…”
Section: Discussionmentioning
confidence: 99%
“…That way, probing can be detected no matter whether extensive FIB editing was used to uncover target lines, or whether a probe was connected on the back side. The only approach that detects such attacks and that has been evaluated with respect to process, voltage, and temperature variation is the probe attempt detector (PAD) by Manich et al [7] whose principle of operation is briefly described in Section II-B. However, the necessity of a large tank capacitor that needs to be charged and discharged still comes with an area, power, and timing overhead that prevents it from being used in ultralow resource applications.…”
Section: A State Of the Artmentioning
confidence: 99%
See 3 more Smart Citations