2020
DOI: 10.1109/tcad.2019.2952133
|View full text |Cite
|
Sign up to set email alerts
|

A Physical Design Flow Against Front-Side Probing Attacks by Internal Shielding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…A variety of countermeasures and evaluation techniques have emerged to counter FIB-based probing attacks. For example, in [31], an anti-probing physical design approach is introduced, which utilizes internal shield nets within the design layout. This method can establish single-layer and two-layer parallel shield structures to protect against probing from the top metal layer of the chip.…”
Section: Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…A variety of countermeasures and evaluation techniques have emerged to counter FIB-based probing attacks. For example, in [31], an anti-probing physical design approach is introduced, which utilizes internal shield nets within the design layout. This method can establish single-layer and two-layer parallel shield structures to protect against probing from the top metal layer of the chip.…”
Section: Countermeasuresmentioning
confidence: 99%
“…• Improved simplicity and accuracy: We extend our linear programming-based approach in [31] to a hybrid model covering both linear and nonlinear scenarios such that the vulnerabilities of reroute attacks within the target layout can be analyzed in a more comprehensive and accurate manner. Although the linear programming we utilized previously can be effective in reroute attack vulnerability assessment, the linear constraints increase exponentially with respect to targets and associated shield nets.…”
mentioning
confidence: 99%
“…This type of attack is usually prevented by adding protecting shields (active or passive). Anyhow, these shields are expensive and consume, at least, a full metallization layer [45]. A second vulnerability exists during the reading of the cells.…”
Section: Rram Cell and Security Aspectsmentioning
confidence: 99%
“…In this context, we propose a multilayer array architecture, as illustrated in Figure 18. Multilayer RRAMs is a technology that has been already proposed as a way for building denser memories [44][45][46], therefore it can also be leveraged for this serial RRAM cell configuration, avoiding the need of a specific array design or technology, which could discourage its implementation. Two word-lines are necessary to bias nodes V ap1 (WL1) and V ap3 (WL2) while nodes V ap2 are connected through transmission gates to the bit lines.…”
Section: Array Architecturementioning
confidence: 99%
“…Since probing models and tools can identify nets of interest for an attacker to probe, they can be used to distribute these physical countermeasures in a more efficient way. [161] investigates a CAD flow to automatically place-and-route shields over the most critical nets, but its approach for selecting the nets is ad hoc and inapplicable to masked circuits. 6.1.5 Quantification of Side Channel-based Disassembly.…”
Section: Evaluation Of Probing Sensors and Physical Countermeasuresmentioning
confidence: 99%