TY - JOUR
T1 - DEFending Integrated Circuit Layouts
AU - Bhandari, Jitendra
AU - Gopinath, Jayanth
AU - Ashraf, Mohammed
AU - Knechtel, Johann
AU - Sinanoglu, Ozgur
AU - Karri, Ramesh
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2025
Y1 - 2025
N2 - Modern integrated circuits (ICs) require a complex, outsourced supply-chain, involving computer-aided design (CAD) tools, expert knowledge, and advanced foundries. This complexity has led to various security threats, such as Trojans inserted by adversaries during outsourcing, but also run-time threats like physical probing. Our proposed design-time solution, DEFense, is an extensible CAD framework for holistic assessment and proactive mitigation of multiple prominent threats. The goal is to prioritize security concerns during the physical design of ICs, alongside traditional power, performance, and area (PPA) objectives. DEFense utilizes an iterative and modular approach to assess and mitigate various known vulnerabilities in the IC layout, which are targeting on sensitive active devices and wires. It is a flexible and extensible scripting framework without the need for modifications to commercial CAD flows, yet with the same high level of design quality. We have conducted extensive case studies on representative modern IC designs to "DEFend"layouts against Trojan insertion, probing, and crosstalk attacks. We are providing the framework to the community.
AB - Modern integrated circuits (ICs) require a complex, outsourced supply-chain, involving computer-aided design (CAD) tools, expert knowledge, and advanced foundries. This complexity has led to various security threats, such as Trojans inserted by adversaries during outsourcing, but also run-time threats like physical probing. Our proposed design-time solution, DEFense, is an extensible CAD framework for holistic assessment and proactive mitigation of multiple prominent threats. The goal is to prioritize security concerns during the physical design of ICs, alongside traditional power, performance, and area (PPA) objectives. DEFense utilizes an iterative and modular approach to assess and mitigate various known vulnerabilities in the IC layout, which are targeting on sensitive active devices and wires. It is a flexible and extensible scripting framework without the need for modifications to commercial CAD flows, yet with the same high level of design quality. We have conducted extensive case studies on representative modern IC designs to "DEFend"layouts against Trojan insertion, probing, and crosstalk attacks. We are providing the framework to the community.
KW - Hardware security
KW - Trojans
KW - physical design
KW - probing attacks
KW - security assessment
UR - http://www.scopus.com/inward/record.url?scp=85209090225&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85209090225&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2024.3492810
DO - 10.1109/TIFS.2024.3492810
M3 - Article
AN - SCOPUS:85209090225
SN - 1556-6013
VL - 20
SP - 46
EP - 59
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
ER -