skip to main content
10.1145/3453688.3461758acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

The Curious Case of Trusted IC Provisioning in Untrusted Testing Facilities

Published: 22 June 2021 Publication History

Abstract

Asset provisioning is a crucial step in present-day IC manufacturing process. The nature of on-chip assets can range from crypto keys, IC configurations, and manufacturer firmware to target specific security specifications, policies, and chip debugging information. Given the criticality of the assets, a major part of IC security research is targeted towards the development of their protection mechanisms, especially in post-fabrication deployment phase. However, in this work our curious observation is that a series of novel attack surfaces can stem from asset provisioning at untrusted testing sites and colluding foundries which are not covered by existing threat models and defense schemes. To that end, we study the state-of-the-art protection mechanisms adopted for secure IC provisioning at untrusted testing facilities and highlight their security vulnerabilities. In particular, we show the inadequacy of existing authentication and design obfuscation-based defense mechanisms during asset provisioning through a secure root of trust.

References

[1]
Defense Microelectronics Activity. 2017. DMEA Trusted IC Program. https: //www.dmea.osd.mil/TrustedIC.aspx/.
[2]
R. S. Chakraborty and S. Bhunia. 2009. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 28, 10 (2009), 1493--1502. https: //doi.org/10.1109/TCAD.2009.2028166
[3]
Atul Prasad Deb Nath, Srivalli Boddupalli, Swarup Bhunia, and Sandip Ray. 2020. Resilient System-on-Chip Designs With NoC Fabrics. IEEE Transactions on Information Forensics and Security 15 (2020), 2808--2823. https://doi.org/10.1109/ TIFS.2020.2977534
[4]
Atul Prasad Deb Nath, Sandip Ray, Abhishek Basak, and Swarup Bhunia. 2018. System-on-chip security architecture and CAD framework for hardware patch. In 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC). 733--738. https://doi.org/10.1109/ASPDAC.2018.8297409
[5]
F. Koushanfar. 2012. Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management. IEEE Transactions on Information Forensics and Security 7, 1 (2012), 51--63. https://doi.org/10.1109/TIFS.2011. 2163307
[6]
F. Koushanfar and Y. Alkabani. 2010. Provably secure obfuscation of diverse watermarks for sequential circuits. In 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). 42--47. https://doi.org/10.1109/ HST.2010.5513115
[7]
Aswin Raghav Krishna, Seetharam Narasimhan, Xinmu Wang, and Swarup Bhunia. 2011. MECCA: A Robust Low-Overhead PUF Using Embedded Memory Array. In Cryptographic Hardware and Embedded Systems -- CHES 2011, Bart Preneel and Tsuyoshi Takagi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 407--420.
[8]
Bill McClean. 2020. McClean Report: A Complete Analysis and Forecast of the Integrated Circuit Industry. https://www.icinsights.com/news/bulletins/Fabless-Company-Share-Of-IC-Sales-To-Set-New-Record-In-2020-At-329-/.
[9]
S. M. Plaza and I. L. Markov. 2014. Protecting integrated circuits from piracy with test-aware logic locking. In 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 262--269. https://doi.org/10.1109/ICCAD.2014.7001361
[10]
J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri. 2012. Security analysis of logic obfuscation. In DAC Design Automation Conference 2012. 83--89. https: //doi.org/10.1145/2228360.2228377
[11]
J. A. Roy, F. Koushanfar, and I. L. Markov. 2008. EPIC: Ending Piracy of Integrated Circuits. In 2008 Design, Automation and Test in Europe. 1069--1074. https: //doi.org/10.1109/DATE.2008.4484823
[12]
Reuters Staff. 2017. TSMC says latest chip plant will cost around $20 bln. https://www.reuters.com/article/tsmc-investment/tsmc-says-latest-chip-plant-will-cost-around-20-bln-idUSL3N1O737Z.
[13]
P. Subramanyan, S. Ray, and S. Malik. 2015. Evaluating the security of logic encryption algorithms. In 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 137--143. https://doi.org/10.1109/HST.2015.714025

Cited By

View all
  • (2024)A Zero Trust-Based Framework Employing Blockchain Technology and Ring Oscillator Physical Unclonable Functions for Security of Field Programmable Gate Array Supply ChainIEEE Access10.1109/ACCESS.2024.341857212(89322-89338)Online publication date: 2024

Index Terms

  1. The Curious Case of Trusted IC Provisioning in Untrusted Testing Facilities

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GLSVLSI '21: Proceedings of the 2021 Great Lakes Symposium on VLSI
    June 2021
    504 pages
    ISBN:9781450383936
    DOI:10.1145/3453688
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 June 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. asset provisioning
    2. fabrication-time attacks
    3. fabrication-time defenses
    4. ic provisioning
    5. provisioning attacks
    6. provisioning defenses
    7. testing-time attacks
    8. testing-time defenses

    Qualifiers

    • Research-article

    Conference

    GLSVLSI '21
    Sponsor:
    GLSVLSI '21: Great Lakes Symposium on VLSI 2021
    June 22 - 25, 2021
    Virtual Event, USA

    Acceptance Rates

    Overall Acceptance Rate 312 of 1,156 submissions, 27%

    Upcoming Conference

    GLSVLSI '25
    Great Lakes Symposium on VLSI 2025
    June 30 - July 2, 2025
    New Orleans , LA , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Zero Trust-Based Framework Employing Blockchain Technology and Ring Oscillator Physical Unclonable Functions for Security of Field Programmable Gate Array Supply ChainIEEE Access10.1109/ACCESS.2024.341857212(89322-89338)Online publication date: 2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media