Title
Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation
Abstract
The fabrication of digital Integrated Circuits (ICs) is increasingly outsourced. Given this trend, security is recognized as an important issue. The threat agent is an attacker at the IC foundry that has information about the circuit and inserts covert, malicious circuitry. The use of 3D IC technology has been suggested as a possible technique to counter this threat. However, to our knowledge, there is no prior work on how such technology can be used effectively. We propose a way to use 3D IC technology for security in this context. Specifically, we obfuscate the circuit by lifting wires to a trusted tier, which is fabricated separately. This is referred to as split manufacturing. For this setting, we provide a precise notion of security, that we call k-security, and a characterization of the underlying computational problems and their complexity. We further propose a concrete approach for identifying sets of wires to be lifted, and the corresponding security they provide. We conclude with a comprehensive empirical assessment with benchmark circuits that highlights the security versus cost trade-offs introduced by 3D IC based circuit obfuscation.
Year
Venue
Keywords
2013
USENIX Security
ic technology,circuit obfuscation,cost trade-offs,integrated circuit,comprehensive empirical assessment,digital integrated circuits,ic foundry,split manufacturing,concrete approach,benchmark circuit,securing computer hardware,corresponding security,threat agent
Field
DocType
Citations 
Computational problem,Empirical assessment,Computer science,Computer security,Covert,3d integrated circuit,Three-dimensional integrated circuit,Electronic circuit,Obfuscation,Threat
Conference
48
PageRank 
References 
Authors
1.95
21
4
Name
Order
Citations
PageRank
Frank Imeson1533.74
Ariq Emtenan2481.95
Siddharth Garg367555.14
Mahesh V. Tripunitara455833.06