2016
DOI: 10.5573/jsts.2016.16.4.470
|View full text |Cite
|
Sign up to set email alerts
|

Practical Silicon-Surface-Protection Method using Metal Layer

Abstract: Abstract-The reversal of a silicon chip to find out its security structure is common and possible at the present time. Thanks to reversing, it is possible to use a probing attack to obtain useful information such as personal information or a cryptographic key. For this reason, security-related blocks such as DES (Data Encryption Standard), AES (Advanced Encryption Standard), and RSA (Rivest Shamir Adleman) engines should be located in the lower layer of the chip to guard against a probing attack; in this regar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Countermeasures seek to prevent and/or detect the physical access. Solutions include, e.g., shielding structures in the BEOL [29][30][31], deflection or scrambling structures in the substrate [32], and detector circuitry [33]. Earlier studies such as [34] also considered formally secure techniques.…”
Section: Physical Read-out and Probingmentioning
confidence: 99%
“…Countermeasures seek to prevent and/or detect the physical access. Solutions include, e.g., shielding structures in the BEOL [29][30][31], deflection or scrambling structures in the substrate [32], and detector circuitry [33]. Earlier studies such as [34] also considered formally secure techniques.…”
Section: Physical Read-out and Probingmentioning
confidence: 99%
“…Semi-or fully-invasive probing, monitoring, fault injection, or even circuit modifications are arguably the most severe threats for hardware security at runtime. Related attacks and various countermeasures have been demonstrated for classical 2D ICs, e.g., see [32], [33], [34] and [35], [36], [37], [38].…”
Section: B Probing Monitoring or Circuit Modification Attacksmentioning
confidence: 99%