Abstract

Comprehensive hardware assurance approaches guaranteeing trust on Integrated Circuits (ICs) typically require the verification of the IC design layout and functionality through destructive Reverse Engineering (RE). It is a resource intensive process that will benefit greatly from the extensive integration of data-driven paradigms, especially in the imaging and image analysis phase. Although obvious, this uptake of data-driven approaches into RE-assisted hardware assurance is lagging due to the lack of massive amounts of high-quality labelled data. In this paper, a large-scale synthetic Scanning Electron Microscopy (SEM) dataset, REFICS, is introduced to address this issue. The dataset, the first open-source dataset in the RE community, consists of 800,000 SEM images over two node technologies, 32nm and 90nm, and four cardinal layers of the IC, namely, doping, polysilicon, contact and metal layers. Furthermore, a framework, based on uncertainty and risk, is introduced to compare the efficacy and benefits of existing RE workflows utilizing ad-hoc steps in its execution. These developments are critical in developing RE-assisted hardware assurance into a scalable, automated and fault-tolerant approach. Finally, the work is concluded with the performance analysis of existing machine learning and deep learning approaches for image analysis in RE and hardware assurance.

Highlights

  • In the age of the Internet-of-Things (IoT), finding a product that doesn’t incorporate an Integrated Circuit (IC) into its design and functionality is an extremely challenging task

  • We suggest the use of the CC metric for evaluating connectivity between structures in the segmented image

  • This is exhibited in its ability to discover well-placed stealthy hardware Trojans and verify the source design to discover intellectual properties (IP) infringement

Read more

Summary

Introduction

In the age of the Internet-of-Things (IoT), finding a product that doesn’t incorporate an Integrated Circuit (IC) into its design and functionality is an extremely challenging task. Being mass-produced, these devices are affordable and well-utilized in products ranging from low-cost IoT devices to high-performance computing clusters Due to their ubiquity, they are exposed to almost all the data that flows through the internet. Apart from faulty hardware design that leads to compromised data, there are flaws that are introduced in the design, by adversaries, to compromise the design and, the data or the functionality of the IC at will. These malicious modifications made to the source design are called hardware Trojans.

Objectives
Findings
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.