8 research outputs found
Raise Your Game for Split Manufacturing: Restoring the True Functionality Through BEOL
Split manufacturing (SM) seeks to protect against piracy of intellectual
property (IP) in chip designs. Here we propose a scheme to manipulate both
placement and routing in an intertwined manner, thereby increasing the
resilience of SM layouts. Key stages of our scheme are to (partially) randomize
a design, place and route the erroneous netlist, and restore the original
design by re-routing the BEOL. Based on state-of-the-art proximity attacks, we
demonstrate that our scheme notably excels over the prior art (i.e., 0% correct
connection rates). Our scheme induces controllable PPA overheads and lowers
commercial cost (the latter by splitting at higher layers).Comment: Design Automation Conference 201
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as an effective countermeasure against
hardware-level threats such as IP piracy, overbuilding, and insertion of
hardware Trojans. Nevertheless, the security promise of split manufacturing has
been challenged by various attacks, which exploit the well-known working
principles of physical design tools to infer the missing BEOL interconnects. In
this work, we advocate a new paradigm to enhance the security for split
manufacturing. Based on Kerckhoff's principle, we protect the FEOL layout in a
formal and secure manner, by embedding keys. These keys are purposefully
implemented and routed through the BEOL in such a way that they become
indecipherable to the state-of-the-art FEOL-centric attacks. We provide our
secure physical design flow to the community. We also define the security of
split manufacturing formally and provide the associated proofs. At the same
time, our technique is competitive with current schemes in terms of layout
overhead, especially for practical, large-scale designs (ITC'99 benchmarks).Comment: DATE 2019 (https://www.date-conference.com/conference/session/4.5