TY - JOUR
T1 - Hardware Trojan Detection Using Backside Optical Imaging
AU - Zhou, Boyou
AU - Aksoylar, Aydan
AU - Vigil, Kyle
AU - Adato, Ronen
AU - Tan, Jian
AU - Goldberg, Bennett
AU - Unlu, M. Selim
AU - Joshi, Ajay
N1 - Funding Information:
Manuscript received September 3, 2019; revised January 14, 2020; accepted April 7, 2020. Date of publication April 30, 2020; date of current version January 11, 2021. This work was supported in part by the Boston University, and in part by NSF under Grant ECCS-1641018. This article was recommended by Associate Editor Y. Jin. (Corresponding author: Boyou Zhou.) Boyou Zhou is with Analog Garage, Analog Devices Inc., Santa Clara, CA 95054 USA. (e-mail: bobzhou@bu.edu). Aydan Aksoylar is with the Autonomous Systems Group, Microsoft Corporation, San Francisco, CA 94103 USA. Kyle Vigil is with Physics Department, Boston University, Boston, MA 02215 USA. Ronen Adato is with Patent Agent at Choate, Hall & Stewart LLP, Boston, MA 02210 USA. Jian Tan is with Teledyne LeCroy, Chestnut Ridge, NY 10977 USA. Bennett Goldberg is with the Office of the Provost, Northwestern University, Evanston, IL 60208 USA. M. Selim Ünlü and Ajay Joshi are with the Department of Electrical and Computer Engineering, Boston University, Boston, MA 02215 USA. Digital Object Identifier 10.1109/TCAD.2020.2991680
Publisher Copyright:
© 1982-2012 IEEE.
PY - 2021/1
Y1 - 2021/1
N2 - The high cost of integrated circuit chip production has driven more and more chip design companies to use overseas production services. Since the integrated circuit production cannot be closely monitored, the security of integrated circuit chips has become a major concern. Hardware Trojan (HT) insertion is one type of the hardware attack. HTs are extremely stealthy due to their small sizes and low triggering rates. HTs inserted during manufacturing can have minimum impact on the timing and power. In fact, this impact can be smaller than the timing and power variations caused by the process variations. Therefore, these HTs cannot be easily detected using traditional electrical methods. In this article, we propose a novel optical method, where we image the integrated circuit chip from the backside. Our method, can easily detect any replacements, modifications, or rearrangements of fill cells or functional cells for HT insertion. We use a noise-based detection method to achieve high HT detection rates in different testbenches. To further improve the robustness of our method, we strategically place high reflectance fill cells in the designs. Our approach provides high-resolution, nondestructive, and rapid means to detect HTs inserted during fabrication. We evaluate our approach using various hardware blocks where the HTs can occupy less than 0.1% of the total area or consist of fewer than three gates. In addition, we analyze our method with various magnitudes of noise, process variations, detection window sizes, and resolutions.
AB - The high cost of integrated circuit chip production has driven more and more chip design companies to use overseas production services. Since the integrated circuit production cannot be closely monitored, the security of integrated circuit chips has become a major concern. Hardware Trojan (HT) insertion is one type of the hardware attack. HTs are extremely stealthy due to their small sizes and low triggering rates. HTs inserted during manufacturing can have minimum impact on the timing and power. In fact, this impact can be smaller than the timing and power variations caused by the process variations. Therefore, these HTs cannot be easily detected using traditional electrical methods. In this article, we propose a novel optical method, where we image the integrated circuit chip from the backside. Our method, can easily detect any replacements, modifications, or rearrangements of fill cells or functional cells for HT insertion. We use a noise-based detection method to achieve high HT detection rates in different testbenches. To further improve the robustness of our method, we strategically place high reflectance fill cells in the designs. Our approach provides high-resolution, nondestructive, and rapid means to detect HTs inserted during fabrication. We evaluate our approach using various hardware blocks where the HTs can occupy less than 0.1% of the total area or consist of fewer than three gates. In addition, we analyze our method with various magnitudes of noise, process variations, detection window sizes, and resolutions.
KW - Hardware security
KW - hardware Trojan (HT) detection
KW - near-infrared (IR) imaging
KW - optical imaging
UR - http://www.scopus.com/inward/record.url?scp=85084227850&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85084227850&partnerID=8YFLogxK
U2 - 10.1109/TCAD.2020.2991680
DO - 10.1109/TCAD.2020.2991680
M3 - Article
AN - SCOPUS:85084227850
SN - 0278-0070
VL - 40
SP - 24
EP - 37
JO - IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
JF - IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
IS - 1
M1 - 9082689
ER -