论文标题
一项关于拆分制造的调查:攻击,防御和挑战
A Survey on Split Manufacturing: Attacks, Defenses, and Challenges
论文作者
论文摘要
在当今的综合电路(IC)生态系统中,拥有铸造厂在经济上并不可行,因此,大多数IC设计公司现在都在Fabless商业模型下工作。为了克服与IC制造外部相关的安全问题,提出了拆分制造技术。在分裂制造中,线(Feol)层的前端(晶体管和低金属层)是在不受信任的高端铸造厂制造的,而在可信赖的低端铸造厂生产了线(Beol)层(Beol)层(较高金属层)。这种方法隐藏了不受信任的铸造厂的Beol连接,从而防止了生产过多和盗版威胁。但是,许多作品表明,Beol连接可以通过利用在典型的地板,放置和路由算法中使用的启发式方法引入的布局特性来得出。由于直接的拆分制造业可能无法提供理想的安全水平,因此许多作者建议将防御技术与拆分制造一起使用。在我们的调查中,我们介绍了该技术的详细概述,对拆分制造的许多类型的攻击以及文献中所述的防御技术。对于攻击,我们对不同的威胁模型和假设进行了简洁的讨论,而对于防御措施,我们将研究分为三类:接近性扰动,抬起线和布局混淆。我们调查的主要结果是强调许多研究之间的差异 - 有些人声称可以以几乎完美的精确度重建网表单,而另一些人则声称在检索Beol连接方面的微不足道成功。最后,我们还讨论了拆分制造业固有的未来趋势和挑战,包括评估技术效率的基本困难。
In today's integrated circuit (IC) ecosystem, owning a foundry is not economically viable, and therefore most IC design houses are now working under a fabless business model. In order to overcome security concerns associated with the outsorcing of IC fabrication, the Split Manufacturing technique was proposed. In Split Manufacturing, the Front End of Line (FEOL) layers (transistors and lower metal layers) are fabricated at an untrusted high-end foundry, while the Back End of Line (BEOL) layers (higher metal layers) are manufactured at a trusted low-end foundry. This approach hides the BEOL connections from the untrusted foundry, thus preventing overproduction and piracy threats. However, many works demonstrate that BEOL connections can be derived by exploiting layout characteristics that are introduced by heuristics employed in typical floorplanning, placement, and routing algorithms. Since straightforward Split Manufacturing may not afford a desirable security level, many authors propose defense techniques to be used along with Split Manufacturing. In our survey, we present a detailed overview of the technique, the many types of attacks towards Split Manufacturing, as well as possible defense techniques described in the literature. For the attacks, we present a concise discussion on the different threat models and assumptions, while for the defenses we classify the studies into three categories: proximity perturbation, wire lifting, and layout obfuscation. The main outcome of our survey is to highlight the discrepancy between many studies -- some claim netlists can be reconstructed with near perfect precision, while others claim marginal success in retrieving BEOL connections. Finally, we also discuss future trends and challenges inherent to Split Manufacturing, including the fundamental difficulty of evaluating the efficiency of the technique.