Skip Nav Destination
Close Modal
Search Results for
hardware security
Update search
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
NARROW
Format
Topics
Journal
Article Type
Date
Availability
1-20 of 35 Search Results for
hardware security
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
1
Sort by
Journal Articles
EDFA Technical Articles (2019) 21 (3): 16–24.
Published: 01 August 2019
... serve as trust verification tools and provides practical guidelines for making hardware more secure. This article presents a comprehensive study of physical inspection and attack methods, describing the approaches typically used by counterfeiters and adversaries as well as the risks and threats...
Abstract
View article
PDF
This article presents a comprehensive study of physical inspection and attack methods, describing the approaches typically used by counterfeiters and adversaries as well as the risks and threats created. It also explains how physical inspection methods can serve as trust verification tools and provides practical guidelines for making hardware more secure.
Journal Articles
EDFA Technical Articles (2019) 21 (4): 60–62.
Published: 01 November 2019
...E.L. Principe This column discusses the potential benefits of developing a dedicated synchrotron-based tool suite for advanced, high-throughput characterization, deprocessing, and validation of ICs. Copyright © ASM International® 2019 2019 ASM International hardware security synchrotron...
Abstract
View article
PDF
This column discusses the potential benefits of developing a dedicated synchrotron-based tool suite for advanced, high-throughput characterization, deprocessing, and validation of ICs.
Journal Articles
EDFA Technical Articles (2022) 24 (4): 22–29.
Published: 01 November 2022
... to distinguish between a high and a low state. Unfortunately, the various physical implementations of NVM cannot always be considered secure from a hardware security perspective. The physical phenomena in these emerging devices can be observed or interfered with using different imaging or fault injection...
Abstract
View article
PDF
This article describes how physical attacks can be launched on different types of nonvolatile memory (NVM) cells using failure analysis tools. It explains how the bit information stored inside these devices is susceptible to read-out and fault injection attacks and defines vulnerability parameters to help quantify risks associated with different modalities of attack. It also presents an in-depth security analysis of emerging NVM technologies and discusses potential countermeasures.
Journal Articles
EDFA Technical Articles (2022) 24 (4): 12–21.
Published: 01 November 2022
... International® ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 24 NO. 4 MEMOMETER: MEMORY PUF-BASED HARDWARE METERING METHODOLOGY FOR FPGAs Anvesh Perumalla and John M. Emmert Department of Electrical and Computer Engineering, University of Cincinnati, Ohio john.emmert@uc.edu INTRODUCTION Security, assurance...
Abstract
View article
PDF
This article describes a hardware metering fingerprint technique, called the memometer, that addresses supply chain integrity issues with field-programmable gate arrays (FPGAs). The memometer is a physically unclonable function (PUF) based on cross-coupled lookup tables that overcomes manufacturing memory power-on preset. The fingerprints are not only unique, but also reliable with average hamming distances close to the ideal values of 50% (interchip) and 0% (intrachip). Instead of having one fingerprint per device, the memometer makes provision for hundreds with the potential for more.
Journal Articles
EDFA Technical Articles (2015) 17 (3): 12–19.
Published: 01 August 2015
... emission from off-state leakage current,[1] hardware security,[2] and reverse engineering applications,[3] imaging large areas of the chip may be necessary for extracting important information. However, the aggressive scaling of transistor dimensions as well as the increase in chip size pose a challenge...
Abstract
View article
PDF
Engineers at IBM’s Watson Research Center are contending with one of the most fundamental limitations of imaging technology: the tradeoff between spatial resolution and field of view. In this article, they explain how they created tool interfaces, control and automation software, and image analysis and stitching algorithms, enabling photon emission and laser scanning microscopes to produce high-resolution mosaic images of advanced processor cores and other large-area ICs. They describe some of the challenges they faced and explain how their technology can be used to create images based on reflected light, induced voltage, photon emission, and laser stimulation signatures. In one of the latest demonstrations, the technology was used to land and focus a SIL more than 4000 times, acquiring some 16,000 images that were composed into stitched mosaics of several hundred images each.
Journal Articles
EDFA Technical Articles (2021) 23 (2): 4–12.
Published: 01 May 2021
..., and provides insights on effective countermeasures. Copyright © ASM International® 2021 2021 ASM International electro-optical probing flip-chip packages hardware security laser fault injection optical attack threat models 4 httpsdoi.org/10.31399/asm.edfa.2021-2.p004 1537-0755/$19.00 ©ASM...
Abstract
View article
PDF
The inverted orientation of a flip-chip packaged die makes it vulnerable to optical attacks from the backside. This article discusses the nature of that vulnerability, assesses the threats posed by optical inspection tools and techniques, and provides insights on effective countermeasures.
Journal Articles
EDFA Technical Articles (2022) 24 (2): 24–32.
Published: 01 May 2022
... attacks along with practical countermeasures. Copyright © ASM International® 2022 2022 ASM International countermeasures hardware security interposers optical attacks 24 EDFAAO (2022) 2:24-32 httpsdoi.org/10.31399/asm.edfa.2022-2.p024 1537-0755/$19.00 ©ASM International® ELECTRONIC...
Abstract
View article
PDF
Interposers play an important role in 2.5D and 3D packages, routing power and communication signals between dies while maintaining electrical contact with I/O pins. This role and their relatively simple construction makes interposers a target for malicious attacks. In this article, the authors assess the vulnerabilities inherent in the fabrication of interposers and describe various types of optical attacks along with practical countermeasures.
Journal Articles
EDFA Technical Articles (2019) 21 (2): 30–36.
Published: 01 May 2019
... address these challenges. ADDRESSING TRUST AND ASSURANCE THROUGH RE Counterfeit and tampered ICs pose serious threats to hardware-based trust and assurance. In particular, cloned chips and hardware Trojans can violate security requirements of root-of-trust by altering physical integrity and electronic...
Abstract
View article
PDF
Integrated circuits embedded in everyday devices face an increased risk of tampering and intrusion. In this article, the authors explain how reverse engineering techniques, including automated image analysis, can be employed to provide trust and assurance when dealing with commercial off-the-shelf chips.
Journal Articles
EDFA Technical Articles (2017) 19 (4): 36–44.
Published: 01 November 2017
... in electrical engineering from the University of Maryland in 2010 and 2013, respectively. He is an Assistant Professor with the Electrical and Computer Engineering Department at the University of Florida. Dr. Forte s research covers the entire domain of hardware security, from nanodevices to PCBs, with more...
Abstract
View article
PDF
Deprocessing of ICs is often the final step for defect validation in FA cases with limited fault-isolation information. This article presents a workflow for deprocessing ICs from the backside using automated thinning and large-area plasma FIB delayering. Advantages to this approach include a reduction in manual planarization and depackaging and a higher degree of precision and repeatability.
Journal Articles
EDFA Technical Articles (2016) 18 (4): 16–22.
Published: 01 November 2016
... the IBM T.J. Watson Research Center as a postdoctoral researcher, becoming a research staff member in 2004. His major interests are the development and use of new optical methodologies for very-large-scale integration circuit testing and hardware security. He has more than 85 international publications...
Abstract
View article
PDF
Advancements in photodetector technology are revitalizing time-resolved emission (TRE) techniques in semiconductor failure analysis. In this article, the authors explain how superconducting single-photon detectors improve the capabilities of TRE measurements as demonstrated on 14 nm FinFET technology and an inverter chain with power supply voltages down to 0.4 V.
Journal Articles
EDFA Technical Articles (2019) 21 (1): 12–19.
Published: 01 February 2019
... and computer engineering from Carnegie Mellon University (CMU). He was the recipient of the best paper award at the ACM Great Lakes Symposium on VLSI in 2017. His research interests include integrated circuit testing, machine learning hardware implementation, and hardware security. Ben Niewenhuis received his...
Abstract
View article
PDF
A new product-like test chip developed by engineers at Carnegie Mellon University overcomes the current limitations in conventional test chip design. This article discusses the advantages of the new chip, called the CM-LCV, and presents experimental results showing how it achieves fault coverages comparable to or better than benchmarking designs.
Journal Articles
EDFA Technical Articles (2022) 24 (3): 12–22.
Published: 01 August 2022
... in the SEM image processing domain. REFERENCES 1. Q. Shi, et al.: Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection using Testing and Imaging, Proceedings of the 2019 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2019, May 2019, p. 61 71, DOI: 10.1109/ HST...
Abstract
View article
PDF
This article proposes a design for a real-time Trojan detection system and explores possible solutions to the challenge of large-scale SEM image acquisition. One such solution, a deep-learning approach that generates synthetic micrographs from layout images, shows significant promise. Learning-based approaches are also used to both synthesize and classify cells. The classification outcome is matched with the design exchange format file entry to ensure the purity of the underlying IC.
Journal Articles
EDFA Technical Articles (2024) 26 (3): 14–24.
Published: 01 August 2024
..., Bangladesh, in 2019. He is currently pursuing a Ph.D. in the Electrical and Computer Engineering Department, University of Florida, Gainesville, Fla. His research is focused on multidie packaging security, hardware security and trust, and physical inspection and attacks. Chengjie Xi received an M.S. degree...
Abstract
View article
PDF
This article describes a proposed novel metric to furnish chip designers with a prognostic tool for x-ray imaging in the pre-silicon stage. This metric is fashioned to provide designers with a concrete measure of how visible the fine-pitched features of their designs are under x-ray inspection. It utilizes a combination of x-ray image data collection, analysis, and simulations to evaluate different design elements.
Journal Articles
EDFA Technical Articles (2021) 23 (4): 4–13.
Published: 01 November 2021
..., Journal of Hardware and Systems Security, DOI: 10.1007/s41635-019-00086-6, 2019. (continued on page 12) edfas.org 12 A SAMPLE PREPARATION WORKFLOW FOR DELAYERING A 45 nm NODE SPI MODULE (continued from page 10) ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 23 NO. 4 3. U. Botero, et al.: Hardware Trust...
Abstract
View article
PDF
Further development of SEM-based feature extraction tools for design validation and failure analysis is contingent on reliable sample preparation methods. This article describes how a delayering framework for 130 nm technology was adapted and used on a 45 nm SPI module consisting of 11 metal layers, 10 via layers, two layers of polysilicon, and an active silicon layer. It explains how different polishing and etching methods are used to expose each layer with sufficient contrast for SEM imaging and subsequent feature extraction. By combining polygon sets representing each layer, the full design of the device was reconstructed as shown in one of the images.
Journal Articles
EDFA Technical Articles (2021) 23 (3): 24–31.
Published: 01 August 2021
... memory (ReRAM) showed its relevance on emerging technologies.[3] In parallel to failure analysis, there has been a growing interest from the hardware security community for this technique and its capability to extract encryption keys from ICs has been reported by several research groups.[4] Hence, photon...
Abstract
View article
PDF
This article describes a novel method for improving image resolution achieved using time-resolved photon emission techniques. Instead of directly generating images from photon counting, all detected photons are displayed as a point cloud in 3D space and a new higher-resolution image is generated based on probability density functions associated with photon distributions. Unsupervised learning algorithms identify photon distribution patterns as well as fainter emission sources.
Journal Articles
EDFA Technical Articles (2022) 24 (4): 4–11.
Published: 01 November 2022
... coordinator in the area of hardware security and open-source activities. Christian Boit retired in 2018 as chair of the Semiconductor Devices Department at Technische Universitaet Berlin, Germany. His research focuses on IC failure analysis (FA) and contactless fault isolation (CFI). In recent years, he...
Abstract
View article
PDF
This article presents and evaluates a calibration method that significantly improves the spectral information that can be extracted from photon emission signals obtained from semiconductor devices. Step-by-step instructions are given for calibrating photon emission microscopes for specific measurements such as device parameters and material band gap. The article also discusses the types of errors that can occur during calibration. Although the procedure presented is used on InGaAs sensors, it applies to all common photon emission detectors.
Journal Articles
EDFA Technical Articles (2021) 23 (3): 13–22.
Published: 01 August 2021
..., and use it to send data over the Internet. The publication launched a firestorm of controversy. One security professional quoted in the article said that finding evidence of a nation-state level attack on hardware was like finding a unicorn jumping over a rainbow. Government agencies, however, largely...
Abstract
View article
PDF
Circuit boards are vulnerable to a wide range of ill-intentioned modifications done to gain access to information or malevolently influence control. This article describes the various ways attacks on circuit board can occur and presents examples showing how such attacks might look. It also provides general guidelines for protecting circuit-board design integrity.
Journal Articles
EDFA Technical Articles (2016) 18 (3): 18–21.
Published: 01 August 2016
..., and many of us have garage-door openers, but do we really need these things in the emerging IoT world? Could a system recognize us and let us into our homes securely and conveniently without a key or garage-door opener? It would be great if, when my car approached the driveway of my home, the system sensed...
Abstract
View article
PDF
The Internet of Things concept is the “next big thing,” but what are the obstacles to achieving its potential? This article describes some key challenges with this evolving technology, including device failure, sensitivity, scalability, middleware, and user interaction.
Journal Articles
EDFA Technical Articles (2013) 15 (4): 52–54.
Published: 01 November 2013
... manager at IARPA in the Office of Safe and Secure Operations, where he manages the CAT program. From 2010 to 2012, he was a program manager in the Defense Advanced Research Projects Agency (DARPA) Microsystems Technology Office (MTO), focused on microelectronic integration and hardware assurance...
Abstract
View article
PDF
The semiconductor industry continues to scale microelectronics in accordance with Moore’s Law, as the minimum feature size on integrated circuits has decreased from 800 nm in 1993 to 90 nm in 2003 to 22 nm today. In addition, manufacturing advances include 3-D packaging, with multiple dice stacked in various configurations, and 3-D integrated circuits that use through-silicon vias or through-oxide vias to connect the various dice layers. The Intelligence Advanced Research Projects Activity (IARPA) Circuit Analysis Tools (CAT) program is developing tools and techniques to ensure that the U.S. government has capabilities for circuit analysis at future technology nodes, specifically at 22 nm and beyond, and for chips assembled using advanced packaging techniques. This column describes the CAT program activities and goals.
Journal Articles
EDFA Technical Articles (2015) 17 (3): 50–52.
Published: 01 August 2015
... PROGRAM Carl E. McCants, Program Manager, Safe and Secure Operations Office carl.mccants@iarpa.gov PROGRAM OVERVIEW The semiconductor industry is continuing its move forward with Moore s Law, as 14 nm FinFET integrated circuits are currently in production, and 10 nm circuits are expected within the next...
Abstract
View article
PDF
The second phase of the IARPA Circuit Analysis Tools (CAT) program, which ended in June 2015, focused on the development of prototype tools to demonstrate scalability to the 10 nm node. Our guest columnist, IARPA Program Manager, Carl E. McCants, provides a summary of what the participating teams accomplished.
1