Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging
ثبت نشده
چکیده
Layout camouflaging (LC) is a promising technique to protect chip design intellectual property (IP) from reverse engineers. Most prior art, however, cannot leverage the full potential of LC due to excessive overheads and/or their limited scope on an FEOL-centric and accordingly customized manufacturing process. If at all, most existing techniques can be reasonably applied only to selected parts of a chip— we argue that such “small-scale or custom camouflaging” will eventually be circumvented, irrespective of the underlying technique. In this work, we propose a novel LC scheme which is low-cost and generic—full-chip LC can finally be realized without any reservation. Our scheme is based on obfuscating the interconnects (BEOL); it can be readily applied to any design without modifications in the device layer (FEOL). Applied with split manufacturing in conjunction, our approach is the first in the literature to cope with both the FEOL fab and the enduser being untrustworthy. We implement and evaluate our primitives at the (DRC-clean) layout level; our scheme incurs significantly lower cost than most of the previous works. When comparing fully camouflaged to original layouts (i.e., for 100% LC), we observe on average power, performance, and area overheads of 12%, 30%, and 48%, respectively. Here we also show empirically that most existing LC techniques (as well as ours) can only provide proper resilience against powerful SAT attacks once at least 50% of the layout is camouflaged—only large-scale LC is practically secure. As indicated, our approach can deliver even 100% LC at acceptable cost. Finally, we also make our flow publicly available, enabling the community to protect their sensitive designs.
منابع مشابه
Extraction of Coupled RLC Network from Multi-level Interconnects for Full Chip Simulation
In this paper, an approach is proposed for extracting coupled RLC network from multi-level interconnects. The proposed approach starts with a step of partitioning the layout of the full-chip under consideration into several sublayouts, followed by steps of fracturing the partitioned layout and transforming into the three-dimensional structure. The layout is then classified into three species of...
متن کاملA Layout Sensitivity Model for Estimating Electromigration-vulnerable Narrow Interconnects
During the back-end manufacturing process of IC, intervention of spot defects induces extra and missing material of interconnects causing circuit failures. In this paper, a new type of spot defects called interconnect “narrowing defect” is defined. Interconnect narrowing occurs when spot defects induce missing material of interconnects without resulting in a complete cut. The narrow sites of de...
متن کاملOn-Chip Inductance Modeling and RLC Extraction of VLSI Interconnects for Circuit Simulation
On-Chip inductance modeling of VLSI interconnects is presented which captures 3D geometry from layout design and process technology information. Analytical formulae are derived for quick and accurate inductance estimation which can be used in circuit simulations and whole chip extraction screening process. Circuit simulations show critical global wire inductive effects as well as power and grou...
متن کاملTargeting design, verification, and test challenges
IC AND SYSTEM designers continue to grapple with the challenges of ensuring high performance under tight power consumption constraints, escalating verification costs, and increasing test cost. The semiconductor industry is therefore seeking innovations to reduce design cost, design cycle time, and the cost associated with presilicon and postsilicon qualification. Solutions to these problems req...
متن کاملA Novel Interconnect Camouflaging Technique using Transistor Threshold Voltage
Semiconductor supply chain is increasingly getting exposed to variety of security attacks such as Trojan insertion, cloning, counterfeiting, reverse engineering (RE) and piracy of Intellectual Property (IP) due to involvement of untrusted parties. Camouflaging of gates has been proposed to hide the functionality of gates. However, gate camouflaging is associated with significant area, power and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017