首页|DEFending Integrated Circuit Layouts

DEFending Integrated Circuit Layouts

扫码查看
Modern integrated circuits (ICs) require a complex, outsourced supply-chain, involving computer-aided design (CAD) tools, expert knowledge, and advanced foundries. This complexity has led to various security threats, such as Trojans inserted by adversaries during outsourcing, but also run-time threats like physical probing. Our proposed design-time solution, DEFense, is an extensible CAD framework for holistic assessment and proactive mitigation of multiple prominent threats. The goal is to prioritize security concerns during the physical design of ICs, alongside traditional power, performance, and area (PPA) objectives. DEFense utilizes an iterative and modular approach to assess and mitigate various known vulnerabilities in the IC layout, which are targeting on sensitive active devices and wires. It is a flexible and extensible scripting framework without the need for modifications to commercial CAD flows, yet with the same high level of design quality. We have conducted extensive case studies on representative modern IC designs to “DEFend” layouts against Trojan insertion, probing, and crosstalk attacks. We are providing the framework to the community.

Trojan horsesLayoutSecurityPhysical designRoutingHardwareWhite spacesStandardsCrosstalkClocks

Jitendra Bhandari、Jayanth Gopinath、Mohammed Ashraf、Johann Knechtel、Ozgur Sinanoglu、Ramesh Karri

展开 >

Department of Electrical and Computer Engineering, New York University, New York City, NY, USA

Department of Electrical and Computer Engineering, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates

2025

IEEE transactions on information forensics and security
  • 52