Repository logo
 

Practical Partial Hardware Reverse Engineering Analysis

Published version
Peer-reviewed

Loading...
Thumbnail Image

Type

Article

Change log

Authors

Abstract

Abstract: Reverse engineering typically requires expensive equipment, skilled technicians, time, a cross section of the component to be sliced out and a dedicated reconstruction software. In this paper, we present a low-cost alternative, combining fast frontside sample preparation, electron microscopy imaging, error-free standard cell recognition and within and between-die standard cell statistical analysis (SCSA). Step-by-step, we depict the process to access the transistor’s drain/source area, to acquire the full area of a single chip layer, to adapt pattern recognition for standard cells and to analyze the standard cell width, local/global location and occurrences number. The inner workings of each step are accompanied by results on 45–65-nm FCBGA devices enabling to locate specific areas (e.g. registers, hardware accelerator). We particularly point out the importance of such design information extraction for local fault injection and hardware assurance. The primary goal is to analyze how much design information of a complex integrated circuit can be retrieved with minimal costs and without outsourcing.

Description

Funder: Isaac Newton Trust; doi: https://doi.org/10.13039/501100004815

Keywords

Article, Standard cell, Partial reverse engineering, Pattern recognition, Statistical analysis, Countermeasures

Journal Title

Journal of Hardware and Systems Security

Conference Name

Journal ISSN

2509-3428
2509-3436

Volume Title

4

Publisher

Springer International Publishing
Sponsorship
Leverhulme Trust (ECF-2017-606)