Design Obfuscation Through 3-D Split Fabrication With Smart Partitioning.

Autor: Nigussie, Theodros, Schabel, Josh C., Lipa, Steve, McIlrath, Lisa, Patti, Robert, Franzon, Paul
Předmět:
Zdroj: IEEE Transactions on Very Large Scale Integration (VLSI) Systems; Sep2022, Vol. 30 Issue 9, p1230-1243, 14p
Abstrakt: We describe a design and fabrication experiment that has been performed to investigate a methodology for assessing the security of application specific integrated circuits (ASICs) fabricated in a split-manufacturing process based on 3-D integrated circuit (3DIC) technologies. The purpose of this process is to protect critical IP from reverse engineering if an adversary obtains either the fabricated wafers or their GDS. A number of 3DIC-based fabrication alternatives were evaluated, and one is selected for this experiment. Several designs, from the trivial to the complex, were used for the study. A self-test module was embedded in each design to facilitate the postfabrication testing. Various obfuscation techniques that include camouflage in the form of function and lookup table hiding and insertion of redundant logic in order to confuse potential attackers were applied. Smart partitioning was implemented for each design in an attempt to conceal vital functions. We introduced metrics that are based on the number of connection possibilities ($C_{p}$) and the depth of partitioning ($P_{\mathrm{ depth}}$) to measure the obfuscation strength. The results show that it should take more than 10 60 years to reconstruct the netlist using a brute-force attack. Measurement results are presented showing fabrication success. [ABSTRACT FROM AUTHOR]
Databáze: Complementary Index