Loading…

Backside Security Assessment of Modern SoCs

A System-on-chip (SoC) accommodates differentsecurity-sensitive modules and information, collectively knownas assets. Protecting the assets from a malicious entity is thekey objective of the security architecture of the SoC. On theother hand, optical debugging and diagnosis based physicalinspection...

Full description

Saved in:
Bibliographic Details
Main Authors: Rahman, Mir Tanjidur, Asadizanjani, Navid
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 24
container_issue
container_start_page 18
container_title
container_volume
creator Rahman, Mir Tanjidur
Asadizanjani, Navid
description A System-on-chip (SoC) accommodates differentsecurity-sensitive modules and information, collectively knownas assets. Protecting the assets from a malicious entity is thekey objective of the security architecture of the SoC. On theother hand, optical debugging and diagnosis based physicalinspection methods are widely used for defects and failureslocalization in silicon implementation. Transparency of silicon tonear-infrared (NIR) light is used for optical debugging purposes, e.g., photon emission analysis, laser-voltage probing/imaging, laser stimulation. The mentioned above semi-/non-invasive opticalapproaches allow run-time monitoring of the transistor througha silicon substrate, i.e., chip backside. Besides, to facilitate thefailure analysis, no protection scheme is implemented at theSoC backside. Therefore, an attacker can effortlessly track andextract the chip assets by optically attacking the security-sensitivemodules. Thus, the silicon substrate appears as the new "back-door" for SoC security. Though different countermeasures havebeen proposed, none proved to be impeccable against differentclasses of optical attacks. Therefore, to identify the attack surfacefor optical attacks, we surveyed the security threat imposed byvarious optical attacks. Based on the capability and chip designasset availability, we have also classified the potential adversariesto exploit the semi-invasive optical techniques. Finally, we turnedour focus about the threat of optical attacks in the existingand emerging smaller technology nodes and concluded withsuggestions for future research direction.
doi_str_mv 10.1109/MTV48867.2019.00012
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9027222</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9027222</ieee_id><sourcerecordid>9027222</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-e65e876fbc97c724d487b8c14526772eb498b49cb0c0e77f1861b5d923b24da73</originalsourceid><addsrcrecordid>eNotjE1Lw0AQQFdBsNb-gl5yl9SZ2Y_ZPdagVWjx0Oq1ZDcTiNpGsvHQf29BD493eTyl5ggLRAj3m9278d7xggDDAgCQLtQssEcmjxbI6ks1Ia2ptI7NtbrJ-QPAWIcwUXcPdfrMXSPFVtLP0I2nYpmz5HyQ41j0bbHpGxmOxbav8q26auuvLLN_T9Xb0-Ouei7Xr6uXarkuOwI9luKseHZtTIETk2mM5-gTGkuOmSSa4M-kCAmEuUXvMNomkI7nuGY9VfO_byci---hO9TDaR-AmIj0LyJpQVQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Backside Security Assessment of Modern SoCs</title><source>IEEE Xplore All Conference Series</source><creator>Rahman, Mir Tanjidur ; Asadizanjani, Navid</creator><creatorcontrib>Rahman, Mir Tanjidur ; Asadizanjani, Navid</creatorcontrib><description>A System-on-chip (SoC) accommodates differentsecurity-sensitive modules and information, collectively knownas assets. Protecting the assets from a malicious entity is thekey objective of the security architecture of the SoC. On theother hand, optical debugging and diagnosis based physicalinspection methods are widely used for defects and failureslocalization in silicon implementation. Transparency of silicon tonear-infrared (NIR) light is used for optical debugging purposes, e.g., photon emission analysis, laser-voltage probing/imaging, laser stimulation. The mentioned above semi-/non-invasive opticalapproaches allow run-time monitoring of the transistor througha silicon substrate, i.e., chip backside. Besides, to facilitate thefailure analysis, no protection scheme is implemented at theSoC backside. Therefore, an attacker can effortlessly track andextract the chip assets by optically attacking the security-sensitivemodules. Thus, the silicon substrate appears as the new "back-door" for SoC security. Though different countermeasures havebeen proposed, none proved to be impeccable against differentclasses of optical attacks. Therefore, to identify the attack surfacefor optical attacks, we surveyed the security threat imposed byvarious optical attacks. Based on the capability and chip designasset availability, we have also classified the potential adversariesto exploit the semi-invasive optical techniques. Finally, we turnedour focus about the threat of optical attacks in the existingand emerging smaller technology nodes and concluded withsuggestions for future research direction.</description><identifier>EISSN: 2332-5674</identifier><identifier>EISBN: 9781728150253</identifier><identifier>EISBN: 1728150256</identifier><identifier>DOI: 10.1109/MTV48867.2019.00012</identifier><language>eng</language><publisher>IEEE</publisher><subject>Biomedical optical imaging ; Optical imaging ; Optical sensors ; Photonics ; Security ; Stimulated emission ; Transistors</subject><ispartof>2019 20th International Workshop on Microprocessor/SoC Test, Security and Verification (MTV), 2019, p.18-24</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9027222$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27924,54554,54931</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9027222$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Rahman, Mir Tanjidur</creatorcontrib><creatorcontrib>Asadizanjani, Navid</creatorcontrib><title>Backside Security Assessment of Modern SoCs</title><title>2019 20th International Workshop on Microprocessor/SoC Test, Security and Verification (MTV)</title><addtitle>MTV</addtitle><description>A System-on-chip (SoC) accommodates differentsecurity-sensitive modules and information, collectively knownas assets. Protecting the assets from a malicious entity is thekey objective of the security architecture of the SoC. On theother hand, optical debugging and diagnosis based physicalinspection methods are widely used for defects and failureslocalization in silicon implementation. Transparency of silicon tonear-infrared (NIR) light is used for optical debugging purposes, e.g., photon emission analysis, laser-voltage probing/imaging, laser stimulation. The mentioned above semi-/non-invasive opticalapproaches allow run-time monitoring of the transistor througha silicon substrate, i.e., chip backside. Besides, to facilitate thefailure analysis, no protection scheme is implemented at theSoC backside. Therefore, an attacker can effortlessly track andextract the chip assets by optically attacking the security-sensitivemodules. Thus, the silicon substrate appears as the new "back-door" for SoC security. Though different countermeasures havebeen proposed, none proved to be impeccable against differentclasses of optical attacks. Therefore, to identify the attack surfacefor optical attacks, we surveyed the security threat imposed byvarious optical attacks. Based on the capability and chip designasset availability, we have also classified the potential adversariesto exploit the semi-invasive optical techniques. Finally, we turnedour focus about the threat of optical attacks in the existingand emerging smaller technology nodes and concluded withsuggestions for future research direction.</description><subject>Biomedical optical imaging</subject><subject>Optical imaging</subject><subject>Optical sensors</subject><subject>Photonics</subject><subject>Security</subject><subject>Stimulated emission</subject><subject>Transistors</subject><issn>2332-5674</issn><isbn>9781728150253</isbn><isbn>1728150256</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2019</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjE1Lw0AQQFdBsNb-gl5yl9SZ2Y_ZPdagVWjx0Oq1ZDcTiNpGsvHQf29BD493eTyl5ggLRAj3m9278d7xggDDAgCQLtQssEcmjxbI6ks1Ia2ptI7NtbrJ-QPAWIcwUXcPdfrMXSPFVtLP0I2nYpmz5HyQ41j0bbHpGxmOxbav8q26auuvLLN_T9Xb0-Ouei7Xr6uXarkuOwI9luKseHZtTIETk2mM5-gTGkuOmSSa4M-kCAmEuUXvMNomkI7nuGY9VfO_byci---hO9TDaR-AmIj0LyJpQVQ</recordid><startdate>201912</startdate><enddate>201912</enddate><creator>Rahman, Mir Tanjidur</creator><creator>Asadizanjani, Navid</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201912</creationdate><title>Backside Security Assessment of Modern SoCs</title><author>Rahman, Mir Tanjidur ; Asadizanjani, Navid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-e65e876fbc97c724d487b8c14526772eb498b49cb0c0e77f1861b5d923b24da73</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Biomedical optical imaging</topic><topic>Optical imaging</topic><topic>Optical sensors</topic><topic>Photonics</topic><topic>Security</topic><topic>Stimulated emission</topic><topic>Transistors</topic><toplevel>online_resources</toplevel><creatorcontrib>Rahman, Mir Tanjidur</creatorcontrib><creatorcontrib>Asadizanjani, Navid</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Rahman, Mir Tanjidur</au><au>Asadizanjani, Navid</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Backside Security Assessment of Modern SoCs</atitle><btitle>2019 20th International Workshop on Microprocessor/SoC Test, Security and Verification (MTV)</btitle><stitle>MTV</stitle><date>2019-12</date><risdate>2019</risdate><spage>18</spage><epage>24</epage><pages>18-24</pages><eissn>2332-5674</eissn><eisbn>9781728150253</eisbn><eisbn>1728150256</eisbn><abstract>A System-on-chip (SoC) accommodates differentsecurity-sensitive modules and information, collectively knownas assets. Protecting the assets from a malicious entity is thekey objective of the security architecture of the SoC. On theother hand, optical debugging and diagnosis based physicalinspection methods are widely used for defects and failureslocalization in silicon implementation. Transparency of silicon tonear-infrared (NIR) light is used for optical debugging purposes, e.g., photon emission analysis, laser-voltage probing/imaging, laser stimulation. The mentioned above semi-/non-invasive opticalapproaches allow run-time monitoring of the transistor througha silicon substrate, i.e., chip backside. Besides, to facilitate thefailure analysis, no protection scheme is implemented at theSoC backside. Therefore, an attacker can effortlessly track andextract the chip assets by optically attacking the security-sensitivemodules. Thus, the silicon substrate appears as the new "back-door" for SoC security. Though different countermeasures havebeen proposed, none proved to be impeccable against differentclasses of optical attacks. Therefore, to identify the attack surfacefor optical attacks, we surveyed the security threat imposed byvarious optical attacks. Based on the capability and chip designasset availability, we have also classified the potential adversariesto exploit the semi-invasive optical techniques. Finally, we turnedour focus about the threat of optical attacks in the existingand emerging smaller technology nodes and concluded withsuggestions for future research direction.</abstract><pub>IEEE</pub><doi>10.1109/MTV48867.2019.00012</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2332-5674
ispartof 2019 20th International Workshop on Microprocessor/SoC Test, Security and Verification (MTV), 2019, p.18-24
issn 2332-5674
language eng
recordid cdi_ieee_primary_9027222
source IEEE Xplore All Conference Series
subjects Biomedical optical imaging
Optical imaging
Optical sensors
Photonics
Security
Stimulated emission
Transistors
title Backside Security Assessment of Modern SoCs
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T18%3A15%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Backside%20Security%20Assessment%20of%20Modern%20SoCs&rft.btitle=2019%2020th%20International%20Workshop%20on%20Microprocessor/SoC%20Test,%20Security%20and%20Verification%20(MTV)&rft.au=Rahman,%20Mir%20Tanjidur&rft.date=2019-12&rft.spage=18&rft.epage=24&rft.pages=18-24&rft.eissn=2332-5674&rft_id=info:doi/10.1109/MTV48867.2019.00012&rft.eisbn=9781728150253&rft.eisbn_list=1728150256&rft_dat=%3Cieee_CHZPO%3E9027222%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-e65e876fbc97c724d487b8c14526772eb498b49cb0c0e77f1861b5d923b24da73%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9027222&rfr_iscdi=true