Visible to the public Making Split-fabrication More Secure

TitleMaking Split-fabrication More Secure
Publication TypeConference Paper
Year of Publication2016
AuthorsYang, Ping-Lin, Marek-Sadowska, Malgorzata
Conference NameProceedings of the 35th International Conference on Computer-Aided Design
Date PublishedNovember 2016
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4466-1
Keywords2D, 3D, composability, hardware security, monolithic 3D, piracy prevention, pubcrawl, Resiliency, split-fabrication, tamper-proof, Trojan detection, trojan horse detection, trojan prevention, vertical slit field effect transistor (VeSFET)
Abstract

Today many design houses must outsource their design fabrication to a third party which is often an overseas foundry. Split-fabrication is proposed for combining the FEOL capabilities of an advanced but untrusted foundry with the BEOL capabilities of a trusted foundry. Hardware security in this business model relates directly to the front-end foundry's ability to interpret the partial circuit design it receives in order to reverse engineer or insert malicious circuits. The published experimental results indicate that a relatively large percentage of the split nets can be correctly guessed and there is no easy way of detecting the possibly inserted Trojans. In this paper, we propose a secure split-fabrication design methodology for the Vertical Slit Field Effect Transistor (VeSFET) based integrated circuits. We take advantage of the VeSFET's unique and powerful two-side accessibility and monolithic 3D integration capability. In our approach the design is manufactured by two independent foundries, both of which can be untrusted. We propose the design partition and piracy prevention, hardware Trojan insertion prevention, and Trojan detection methods. In the 3D designs, some transistors are physically hidden from the front-end foundry\_1's view, which causes that it is impossible for this foundry to reconstruct the circuit. We designed 10 MCNC benchmark circuits using the proposed flow and executed an attack by an in-house developed proximity attacker. With 5% nets manufactured by the back-end foundry\_2, the average percentage of the correctly reconstructed partitioned nets is less than 1%.

URLhttps://dl.acm.org/doi/10.1145/2966986.2967053
DOI10.1145/2966986.2967053
Citation Keyyang_making_2016