Abstract
Information security of smart grid has received increasing attention with more and more attack incidents. Security chip plays an important role in smart grid, such as in smart meter and electrical terminals. Now security chip is facing great challenges from invasive attacks, which could tamper or steal sensitive information by physical methods. Security shield is considered as a necessary guard to defend invasive attacks on security chips. In this work, a divide-and-conquer and dynamic programming optimized algorithm (DCDPOA) is introduced and a useful tool for security shield generation is developed. A detective mechanism for security shield is also designed and discussed in this work. Then the generated metal shield topology and full-chip layout with active shield are demonstrated. At last, the chip is taped out to manufacture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shen, C.X., Zhang, H.G., Feng, D.G.: Survey of information security. Sci. China Inf. Sci. 50(3), 273–298 (2007)
Christopher, T.: Security failures in secure devices. In: Black Hat DC (2008)
Boit, C., Helfmeier, C., Kerst, U.: Security risks posed by modern IC debug & diagnosis tools. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (2013)
Tria, A., Choukri, H.: Invasive attacks. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography & Security, pp. 623–629. Springer, Heidelberg (2011). https://doi.org/10.1007/978-1-4419-5906-5
Kommerling, O., Kuhn, M.G.: Design principles for temper-resistant smartcard processors. In: Usenix Workshop on Smartcard Technology (1999)
Ray, V.: Invasive FIB attacks and countermeasures in hardware security devices. In: East-Coast Focused Ion Beam User Group Meeting (2009)
Helfmeier, C., Boit, C., Kerst, U.: On charge sensors for FIB attack detection. In: IEEE International Symposium on Hardware-Oriented Security & Trust, vol. 17, pp. 128–133 (2012)
Xuan, T.N., Danger, J.L., Guilley, S.: Cryptographically secure shield for security IPs protection. IEEE Trans. Comput. 66(2), 354–360 (2017)
Cioranesco, J.M., Danger, J.L., Graba, T.: Cryptographically secure shields. In: IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 25–31 (2014)
Briais, S., et al.: 3D hardware canaries. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 1–22. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33027-8_1
Ling, M., Wu, L., Li, X.: Design of monitor and protect circuits against FIB attack on chip security. In: Eighth International Conference on Computational Intelligence and Security, pp. 530–533 (2012)
Ruishan, X., Yidong, Y., Jiaji, H.: High-efficient generation algorithm for large random active shield. Sci. China Inf. Sci. (2018, to be published)
Briais, S., Cioranesco, J.M., Danger, J.L.: Random active shield. In: Fault Diagnosis & Tolerance in Cryptography (FDTC), vol. 7204, no. 4 (2012)
Acknowledgements
This research was financially supported by the science and technology project of State Grid Corporation of China. The project name is, Key Technology Research and Samper-chip Manufacture on Resistance to Physical Attacks at Circuit Level. The project No. is 546816170002.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jin, R. et al. (2018). Active Shield Design for Security Chip in Smart Grid. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_21
Download citation
DOI: https://doi.org/10.1007/978-981-13-3095-7_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3094-0
Online ISBN: 978-981-13-3095-7
eBook Packages: Computer ScienceComputer Science (R0)