Loading…
Backside Security Assessment of Modern SoCs
A System-on-chip (SoC) accommodates differentsecurity-sensitive modules and information, collectively knownas assets. Protecting the assets from a malicious entity is thekey objective of the security architecture of the SoC. On theother hand, optical debugging and diagnosis based physicalinspection...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 24 |
container_issue | |
container_start_page | 18 |
container_title | |
container_volume | |
creator | Rahman, Mir Tanjidur Asadizanjani, Navid |
description | A System-on-chip (SoC) accommodates differentsecurity-sensitive modules and information, collectively knownas assets. Protecting the assets from a malicious entity is thekey objective of the security architecture of the SoC. On theother hand, optical debugging and diagnosis based physicalinspection methods are widely used for defects and failureslocalization in silicon implementation. Transparency of silicon tonear-infrared (NIR) light is used for optical debugging purposes, e.g., photon emission analysis, laser-voltage probing/imaging, laser stimulation. The mentioned above semi-/non-invasive opticalapproaches allow run-time monitoring of the transistor througha silicon substrate, i.e., chip backside. Besides, to facilitate thefailure analysis, no protection scheme is implemented at theSoC backside. Therefore, an attacker can effortlessly track andextract the chip assets by optically attacking the security-sensitivemodules. Thus, the silicon substrate appears as the new "back-door" for SoC security. Though different countermeasures havebeen proposed, none proved to be impeccable against differentclasses of optical attacks. Therefore, to identify the attack surfacefor optical attacks, we surveyed the security threat imposed byvarious optical attacks. Based on the capability and chip designasset availability, we have also classified the potential adversariesto exploit the semi-invasive optical techniques. Finally, we turnedour focus about the threat of optical attacks in the existingand emerging smaller technology nodes and concluded withsuggestions for future research direction. |
doi_str_mv | 10.1109/MTV48867.2019.00012 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9027222</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9027222</ieee_id><sourcerecordid>9027222</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-e65e876fbc97c724d487b8c14526772eb498b49cb0c0e77f1861b5d923b24da73</originalsourceid><addsrcrecordid>eNotjE1Lw0AQQFdBsNb-gl5yl9SZ2Y_ZPdagVWjx0Oq1ZDcTiNpGsvHQf29BD493eTyl5ggLRAj3m9278d7xggDDAgCQLtQssEcmjxbI6ks1Ia2ptI7NtbrJ-QPAWIcwUXcPdfrMXSPFVtLP0I2nYpmz5HyQ41j0bbHpGxmOxbav8q26auuvLLN_T9Xb0-Ouei7Xr6uXarkuOwI9luKseHZtTIETk2mM5-gTGkuOmSSa4M-kCAmEuUXvMNomkI7nuGY9VfO_byci---hO9TDaR-AmIj0LyJpQVQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Backside Security Assessment of Modern SoCs</title><source>IEEE Xplore All Conference Series</source><creator>Rahman, Mir Tanjidur ; Asadizanjani, Navid</creator><creatorcontrib>Rahman, Mir Tanjidur ; Asadizanjani, Navid</creatorcontrib><description>A System-on-chip (SoC) accommodates differentsecurity-sensitive modules and information, collectively knownas assets. Protecting the assets from a malicious entity is thekey objective of the security architecture of the SoC. On theother hand, optical debugging and diagnosis based physicalinspection methods are widely used for defects and failureslocalization in silicon implementation. Transparency of silicon tonear-infrared (NIR) light is used for optical debugging purposes, e.g., photon emission analysis, laser-voltage probing/imaging, laser stimulation. The mentioned above semi-/non-invasive opticalapproaches allow run-time monitoring of the transistor througha silicon substrate, i.e., chip backside. Besides, to facilitate thefailure analysis, no protection scheme is implemented at theSoC backside. Therefore, an attacker can effortlessly track andextract the chip assets by optically attacking the security-sensitivemodules. Thus, the silicon substrate appears as the new "back-door" for SoC security. Though different countermeasures havebeen proposed, none proved to be impeccable against differentclasses of optical attacks. Therefore, to identify the attack surfacefor optical attacks, we surveyed the security threat imposed byvarious optical attacks. Based on the capability and chip designasset availability, we have also classified the potential adversariesto exploit the semi-invasive optical techniques. Finally, we turnedour focus about the threat of optical attacks in the existingand emerging smaller technology nodes and concluded withsuggestions for future research direction.</description><identifier>EISSN: 2332-5674</identifier><identifier>EISBN: 9781728150253</identifier><identifier>EISBN: 1728150256</identifier><identifier>DOI: 10.1109/MTV48867.2019.00012</identifier><language>eng</language><publisher>IEEE</publisher><subject>Biomedical optical imaging ; Optical imaging ; Optical sensors ; Photonics ; Security ; Stimulated emission ; Transistors</subject><ispartof>2019 20th International Workshop on Microprocessor/SoC Test, Security and Verification (MTV), 2019, p.18-24</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9027222$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27924,54554,54931</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9027222$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Rahman, Mir Tanjidur</creatorcontrib><creatorcontrib>Asadizanjani, Navid</creatorcontrib><title>Backside Security Assessment of Modern SoCs</title><title>2019 20th International Workshop on Microprocessor/SoC Test, Security and Verification (MTV)</title><addtitle>MTV</addtitle><description>A System-on-chip (SoC) accommodates differentsecurity-sensitive modules and information, collectively knownas assets. Protecting the assets from a malicious entity is thekey objective of the security architecture of the SoC. On theother hand, optical debugging and diagnosis based physicalinspection methods are widely used for defects and failureslocalization in silicon implementation. Transparency of silicon tonear-infrared (NIR) light is used for optical debugging purposes, e.g., photon emission analysis, laser-voltage probing/imaging, laser stimulation. The mentioned above semi-/non-invasive opticalapproaches allow run-time monitoring of the transistor througha silicon substrate, i.e., chip backside. Besides, to facilitate thefailure analysis, no protection scheme is implemented at theSoC backside. Therefore, an attacker can effortlessly track andextract the chip assets by optically attacking the security-sensitivemodules. Thus, the silicon substrate appears as the new "back-door" for SoC security. Though different countermeasures havebeen proposed, none proved to be impeccable against differentclasses of optical attacks. Therefore, to identify the attack surfacefor optical attacks, we surveyed the security threat imposed byvarious optical attacks. Based on the capability and chip designasset availability, we have also classified the potential adversariesto exploit the semi-invasive optical techniques. Finally, we turnedour focus about the threat of optical attacks in the existingand emerging smaller technology nodes and concluded withsuggestions for future research direction.</description><subject>Biomedical optical imaging</subject><subject>Optical imaging</subject><subject>Optical sensors</subject><subject>Photonics</subject><subject>Security</subject><subject>Stimulated emission</subject><subject>Transistors</subject><issn>2332-5674</issn><isbn>9781728150253</isbn><isbn>1728150256</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2019</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjE1Lw0AQQFdBsNb-gl5yl9SZ2Y_ZPdagVWjx0Oq1ZDcTiNpGsvHQf29BD493eTyl5ggLRAj3m9278d7xggDDAgCQLtQssEcmjxbI6ks1Ia2ptI7NtbrJ-QPAWIcwUXcPdfrMXSPFVtLP0I2nYpmz5HyQ41j0bbHpGxmOxbav8q26auuvLLN_T9Xb0-Ouei7Xr6uXarkuOwI9luKseHZtTIETk2mM5-gTGkuOmSSa4M-kCAmEuUXvMNomkI7nuGY9VfO_byci---hO9TDaR-AmIj0LyJpQVQ</recordid><startdate>201912</startdate><enddate>201912</enddate><creator>Rahman, Mir Tanjidur</creator><creator>Asadizanjani, Navid</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201912</creationdate><title>Backside Security Assessment of Modern SoCs</title><author>Rahman, Mir Tanjidur ; Asadizanjani, Navid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-e65e876fbc97c724d487b8c14526772eb498b49cb0c0e77f1861b5d923b24da73</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Biomedical optical imaging</topic><topic>Optical imaging</topic><topic>Optical sensors</topic><topic>Photonics</topic><topic>Security</topic><topic>Stimulated emission</topic><topic>Transistors</topic><toplevel>online_resources</toplevel><creatorcontrib>Rahman, Mir Tanjidur</creatorcontrib><creatorcontrib>Asadizanjani, Navid</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Rahman, Mir Tanjidur</au><au>Asadizanjani, Navid</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Backside Security Assessment of Modern SoCs</atitle><btitle>2019 20th International Workshop on Microprocessor/SoC Test, Security and Verification (MTV)</btitle><stitle>MTV</stitle><date>2019-12</date><risdate>2019</risdate><spage>18</spage><epage>24</epage><pages>18-24</pages><eissn>2332-5674</eissn><eisbn>9781728150253</eisbn><eisbn>1728150256</eisbn><abstract>A System-on-chip (SoC) accommodates differentsecurity-sensitive modules and information, collectively knownas assets. Protecting the assets from a malicious entity is thekey objective of the security architecture of the SoC. On theother hand, optical debugging and diagnosis based physicalinspection methods are widely used for defects and failureslocalization in silicon implementation. Transparency of silicon tonear-infrared (NIR) light is used for optical debugging purposes, e.g., photon emission analysis, laser-voltage probing/imaging, laser stimulation. The mentioned above semi-/non-invasive opticalapproaches allow run-time monitoring of the transistor througha silicon substrate, i.e., chip backside. Besides, to facilitate thefailure analysis, no protection scheme is implemented at theSoC backside. Therefore, an attacker can effortlessly track andextract the chip assets by optically attacking the security-sensitivemodules. Thus, the silicon substrate appears as the new "back-door" for SoC security. Though different countermeasures havebeen proposed, none proved to be impeccable against differentclasses of optical attacks. Therefore, to identify the attack surfacefor optical attacks, we surveyed the security threat imposed byvarious optical attacks. Based on the capability and chip designasset availability, we have also classified the potential adversariesto exploit the semi-invasive optical techniques. Finally, we turnedour focus about the threat of optical attacks in the existingand emerging smaller technology nodes and concluded withsuggestions for future research direction.</abstract><pub>IEEE</pub><doi>10.1109/MTV48867.2019.00012</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2332-5674 |
ispartof | 2019 20th International Workshop on Microprocessor/SoC Test, Security and Verification (MTV), 2019, p.18-24 |
issn | 2332-5674 |
language | eng |
recordid | cdi_ieee_primary_9027222 |
source | IEEE Xplore All Conference Series |
subjects | Biomedical optical imaging Optical imaging Optical sensors Photonics Security Stimulated emission Transistors |
title | Backside Security Assessment of Modern SoCs |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T18%3A15%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Backside%20Security%20Assessment%20of%20Modern%20SoCs&rft.btitle=2019%2020th%20International%20Workshop%20on%20Microprocessor/SoC%20Test,%20Security%20and%20Verification%20(MTV)&rft.au=Rahman,%20Mir%20Tanjidur&rft.date=2019-12&rft.spage=18&rft.epage=24&rft.pages=18-24&rft.eissn=2332-5674&rft_id=info:doi/10.1109/MTV48867.2019.00012&rft.eisbn=9781728150253&rft.eisbn_list=1728150256&rft_dat=%3Cieee_CHZPO%3E9027222%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-e65e876fbc97c724d487b8c14526772eb498b49cb0c0e77f1861b5d923b24da73%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9027222&rfr_iscdi=true |