2012 Workshop on Fault Diagnosis and Tolerance in Cryptography 2012
DOI: 10.1109/fdtc.2012.11
|View full text |Cite
|
Sign up to set email alerts
|

Random Active Shield

Abstract: Recently, some active shielding techniques have been broken (e.g. by FlyLogic). The caveat is that their geometry is easy to guess, and thus they can be bypassed with an affordable price. This paper has two contributions. First of all, it provides a definition of the objectives of shielding, which is seldom found in publicly available sources. Notably, we precise the expected functionality, but also the constraints it must meet to be both manufacturable and secure. Second, we propose an innovative solution bas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(13 citation statements)
references
References 3 publications
0
13
0
Order By: Relevance
“…The silicon-surface protection layer is sometimes called the "top metal layer" because it is the top layer of several metal layers. in other cases, the top layer is called the "active shield" [5], "protection layer," "metal shield," or "top metal." In this paper, the title "silicon-surfaceprotection layer" is used because the term "active shield" is widely used in the areas of magnetic-field shielding and noise shielding.…”
Section: Physical-level-attack Detailsmentioning
confidence: 99%
See 2 more Smart Citations
“…The silicon-surface protection layer is sometimes called the "top metal layer" because it is the top layer of several metal layers. in other cases, the top layer is called the "active shield" [5], "protection layer," "metal shield," or "top metal." In this paper, the title "silicon-surfaceprotection layer" is used because the term "active shield" is widely used in the areas of magnetic-field shielding and noise shielding.…”
Section: Physical-level-attack Detailsmentioning
confidence: 99%
“…10, it is evident that their shapes are non-typical; their patterns are not connected and each line is randomly shaped. This is called a "random active shield" [5], whereby it is more difficult for an FIB to cut and reconnect due to the nature of the protection; therefore, the protective-security level is very high, but, to implement a random active shield, at least two more metal layers are required, and this costs more than other silicon-surface-protection methods.…”
Section: Random Active Shield [5]mentioning
confidence: 99%
See 1 more Smart Citation
“…multiple jogs). If the chip has a shield layer (refer to [10]), then the image recognition might be harder.…”
Section: B Medium Cost Hardware Trojan Horse Detectionmentioning
confidence: 99%
“…In addition, tailored packaging cannot guarantee resistance against attacks from the reverse side of the chip. Another possibility is to install an active shield on or around the LSI to be protected [3][4][5]. However, the power needed to drive signals through the shield is non-trivial.…”
Section: Introductionmentioning
confidence: 99%