HOME | KONTAKT | Switch EN

Logo Universität Bremen
LOGO AGRA | AG Rechnerarchitektur



Arbeitsgruppe Rechnerarchitektur / AGRA | Informatik | FB03 | Universität Bremen

OptiSecure | Securing Nano-Circuits Against Optical Probing


Hand with cellphone Have you ever noticed that while using your phone for say playing a video game or processing a video through a video editing tool, it warms up? This means that certain data is being processed on your phone. However, the amount of voltage applied to your phone by your battery is almost kept intact (let’s say 3.3 volts). This means that when processing information, the amount of current supplied to your phone hardware changes. This amount of current varies in various applications. So what does it means? It means that data processing is power dependent which is a security breach. It has been shown by the researcher that the secret information on your electronic device can be stolen by just looking at the power consumption profile of your electronic device. In principle, to breach security by exploiting electronic devices to gather information from or influence the program execution of a system by measuring or exploiting indirect effects of the system or its hardware -- rather than targeting the program or its code directly. These attacks are known as side channel attacks (SCA).

The mentioned SCA-based attack example is a very well-studied attack in the literature. However, a few years ago researchers found it is possible to steal secret information on electronic devices (more specifically chips) using a non-invasive laser beam. Since silicon materials are transparent to laser beams in the wavelength of the near-infrared region (1100-1300nm), the laser light can travel to the terminals of each transistor. Then based on the voltage present at each terminal of the transistor the reflected light gets modulated due to the strength of the electrical field at each junction. As a result, when the light reflects, the indices of reflection and refraction of the incident light change. Accordingly, based on the change in the indices of reflection and refraction, an attacker can deduce what voltage exists on the transistor. This is a serious thread toward chips. The basic setup for an attack on the chip is shown below.

We are working on a project called “OptiSecure” project. An overview of our project is shown in the figure below.

Overview


The general goal of our project is to investigate methods to prevent optical probing attacks. Our goal is to develop a layout design using existing industry standard technology that is robust toward optical probing attack. As the first step, we developed an optical probing simulator to find out which type of layout design leaks less information toward optical probing. Then to prove the robustness of our layout toward optical probing, we taped-out a chip consisting of various designs. Our chip includes more than 400 test structures that we would like to probe and see its robustness.

ChipNext, we would like to perform an attack on our chip. Then based on our findings from attacking our chip, we will import the reflection values from our chip to our simulator. This will enable our simulator to work more accurately. This feedback loop in our project namely, “OptiSecure” will result in generating accurate optical probing simulation. As a result, by incorporating the results from our optically probed chip, and simulator, we can propose layout styles that are more robust against optical probing attacks.
Besides using optical probing to attack a chip to steal the intellectual property of a chip, we proposed the use of optical probing to defend a chip against trojan insertion. The scenario is when a design house outsources its design to a foundry abroad for fabrication, there is a possibility that the foundry is untrusted and inserts a hardware trojan in your design.
Infographic



Publications | Conferences:


Sajjad Parvin, Mehran Goli, Frank Sill Torres, Rolf Drechsler, “FELOPi: A Framework for Simulation and Evaluation of Post-Layout File Against Optical Probing”, Design, Automation and Test in Europe (DATE) ,Antwerp, Belgium, 2023

Sajjad Parvin, Mehran Goli, Frank Sill Torres, Rolf Drechsler, “Trojan-D2: Post-Layout Design and Detection of Stealthy Hardware Trojans - a RISC-V Case Study “,28th Asia and South Pacific Design Automation Conference (ASP-DAC), Tokyo, Japan, 2023

Sajjad Parvin, Thilo Krachenfels, Shahin Tajik, Jean-Pierre Seifert, Frank Sill Torres and Rolf Drechsler ,”Toward Optical Probing Resistant Circuits: A Comparison of Logic Styles and Circuit Design Techniques”, Asia and South Pacific Design Automation Conference (ASP-DAC) Referenz: Taipei, Taiwan, 2022


©2023 | AG Rechnerarchitektur | Kontakt | Impressum & Datenschutz