[go: nahoru, domu]

CN109585419A - Reinforce important area the chip top-layer metal protection layer wiring method of protection - Google Patents

Reinforce important area the chip top-layer metal protection layer wiring method of protection Download PDF

Info

Publication number
CN109585419A
CN109585419A CN201811165211.5A CN201811165211A CN109585419A CN 109585419 A CN109585419 A CN 109585419A CN 201811165211 A CN201811165211 A CN 201811165211A CN 109585419 A CN109585419 A CN 109585419A
Authority
CN
China
Prior art keywords
wiring
area
protection
layer
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811165211.5A
Other languages
Chinese (zh)
Inventor
赵毅强
甄帅
辛睿山
蔡里昂
赵子龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201811165211.5A priority Critical patent/CN109585419A/en
Publication of CN109585419A publication Critical patent/CN109585419A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L23/00Details of semiconductor or other solid state devices
    • H01L23/52Arrangements for conducting electric current within the device in operation from one component to another, i.e. interconnections, e.g. wires, lead frames
    • H01L23/522Arrangements for conducting electric current within the device in operation from one component to another, i.e. interconnections, e.g. wires, lead frames including external interconnections consisting of a multilayer structure of conductive and insulating layers inseparably formed on the semiconductor body
    • H01L23/528Geometry or layout of the interconnection structure
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/30Circuit design
    • G06F30/39Circuit design at the physical level
    • G06F30/392Floor-planning or layout, e.g. partitioning or placement
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L23/00Details of semiconductor or other solid state devices
    • H01L23/57Protection from inspection, reverse engineering or tampering
    • H01L23/573Protection from inspection, reverse engineering or tampering using passive means

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Condensed Matter Physics & Semiconductors (AREA)
  • Geometry (AREA)
  • Theoretical Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Power Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Computation (AREA)
  • Architecture (AREA)
  • Semiconductor Integrated Circuits (AREA)

Abstract

The present invention relates to chip technologies; line density is walked for top wire can be improved using this method in the fields such as information security, reduces the shielding line failure area of key area; increase attacker and analyze circuit difficulty, achievees the purpose that lay special stress on protecting the key area of chip.Attacker be can effectively prevent by photographic analysis reverse engineering, the attack means such as FIB obtain Data within the chip, improve the safety coefficient of chip key area.Thus, the technical solution adopted by the present invention is that, reinforce important area the chip top-layer metal protection layer wiring method of protection, first the protection level according to actual chips size planning wiring area area and each region, is divided into several wiring areas for top-level metallic shielded layer;Each routing cell is subjected to wiring filling further according to the safety coefficient of wiring area, the cabling quantity in each region is incremented by according to the rising of security level.Present invention is mainly applied to chips to manufacture and design occasion.

Description

Reinforce important area the chip top-layer metal protection layer wiring method of protection
Technical field
The present invention relates to chip technology, the fields such as information security specifically are related to reinforcing important area the chip of protection Top-level metallic protective layer wiring method.
Background technique
Currently, information security issue becomes increasingly conspicuous, every field all proposes increasingly higher demands to information security.It is integrated Circuit chip is as information system core component, safety of the security relationship to entire information system.With microelectronics Technology is constantly progressive, and is constantly suggested for the physical attacks means of IC chip, chip secure and become safety One important research proposition in field.
Compared with software security problem, hardware chip is the field for waiting developing safely.The hand of hardware attack chip Section is gradually diversified, for using image analysis to obtain chip internal structure, uses focused ion beam (FIB, Focused later Ion beam) modification circuit attack, existing preventive means mainly uses top-level metallic protective layer.It is adopted in the top layer of chip With one or more layers metal routing, the unit and line of lower section are shielded, hides Key Circuit, and play the role of fascination.And In top-level metallic cabling, one end is passed through detection signal, and the other end compares detection, can be with if deviation occurs in discovery signal Illustrate to detect attack.But due to existing top layer wiring metal, in the form of a single, mostly parallel cabling is gone down, it is snakelike Cabling, the topological structures such as helix, connection relationship is simple, easily by domain photographic analysis or reverse engineering, so that protective layer fails.
For such attack, this patent proposes a kind of new-type metal protection layer placement-and-routing method, in conjunction with the bottom of chip Layer device layout structure carries out key protection to the important area of chip.Wiring layer is divided into the cloth of several different safety class Line region, and it is individually designed to the progress of the cabling of different zones, improve the safety of top-level metallic protective layer.
Bibliography
1.Skorobogatov S.Physical attacks and tamper resistance[M]// Skorobogatov S.In-troduction to Hardware Security and Trust.Springer,2012: 2012:143–173.
2.Samyde D,Skorobogatov S,Anderson R,et al.On a new way to read data from memory[C].In Security in Storage Workshop,2002.Proceedings.First International IEEE,2002:65–69.
3. anti-physical attack safety chip key technology research [D] [S.l.] of Xu Min: University Of Tianjin, 2012.
4.Skorobogatov S P.Semi-invasive attacks:a new approach to hardware security anal-ysis[D].[S.l.]:Citeseer,2005。
Summary of the invention
In order to overcome the deficiencies of the prior art, the present invention is directed to propose a kind of novel chip shielded layer Wiring method, utilizes This method can be improved top wire and walk line density, reduces the shielding line failure area of key area, increases attacker's analysis Circuit difficulty achievees the purpose that lay special stress on protecting the key area of chip.Attacker be can effectively prevent by taking pictures point Reverse engineering is analysed, the attack means such as FIB obtain Data within the chip, improve the safety coefficient of chip key area.For this purpose, this hair It is bright to adopt the technical scheme that, reinforce important area the chip top-layer metal protection layer wiring method of protection, first according to practical Chip size plans the protection level of wiring area area and each region, and top-level metallic shielded layer is divided into several wiring regions Domain;Each routing cell is subjected to wiring filling further according to the safety coefficient of wiring area, the cabling quantity root in each region It is incremented by according to the rising of security level;It will test signal after the completion to input from the left side certain port of protective layer, completely pass through Wiring layer carries out the output of detection signal on right side, detects signal integrity, judge whether to receive attack, and judge to be attacked Region.
Specifically, snakelike cabling, parallel cabling top layer protective layer trace configurations method: can be used in each wiring area Or random hamiltonian circuit mode carries out wiring filling.
Specifically, key area wiring method: wiring is divided into the region of four pieces of different degree of protection, further according to core The internal structure of piece, chip module easily break through degree, carry out region division to protective layer, and with A, B, C grade label, come area Divide the protection level in these regions;Wherein, C region security grade is minimum, and B area safety coefficient is medium, and a-quadrant safety coefficient is most It is high;After completing layout, metal routing filling is carried out to the region of various wirings security level: by adjacent and security level compared with Low wiring area merges, and carries out unified wiring to these regions, is filled, is filled with the metal wire of large area Potential lines quantity is successively successively decreased from high to low with safety coefficient;For the wiring area B area compared with high safety grade, using intensive Metal wire carry out wiring filling;To the highest a-quadrant of security level, it is routed using random hamiltonian circuit;It is another Wire laying mode can all be filled all areas using random hamiltonian circuit, but distinguish on the item number of cabling; It in the region C, is routed using two random hamiltonian circuits, for B area, uses three parallel random hamiltonian circuits It is routed, for a-quadrant, is routed using four or more random hamiltonian circuits, and its individually designed figure.
Specifically, protective layer connection method: signal send structure send monitoring signals from the several nodes of left margin into Enter, by the metal routing in each wiring area, the output port for reaching right margin is connected with detection structure, and with input Original signal compares, that is, can determine whether under attack;If each port persistently has received detection signal, judgement does not have Have under attack;If there is one or more signal deletion, region under attack is judged according to the route of missing.
The features of the present invention and beneficial effect are:
Top wire wiring is carried out using method proposed by the present invention, so that originally single wiring becomes have multiplicity Property, the identification difficulty of wiring is increased, while also increasing the difficulty that attacker modifies circuit, which adds protective layers Safety coefficient.Outside it, there is a plurality of access by cabling in synchronization, increase the identification difficulty of attacker, and can lead to The safety coefficient for changing the quantity increase region of access is crossed, level of protection is further increased.
Detailed description of the invention:
Fig. 1 chip interior schematic diagram.
The wiring area Fig. 2 divides figure.
Fig. 3 module fills schematic diagram.
Fig. 4 protective layer integrated connection figure.
Specific embodiment
The present invention is directed to the configuration method of traditional top layer metallic layer cabling, has carried out having the evolution and modification stressed, right It is easy the module of leak data, such as memory module in chip, data/address bus etc. can carry out stressing to protect.
1. top layer protective layer trace configurations method:
Entire wiring layer is divided into multiple wiring areas by the area and degree of protection of the protection according to needed for chip module. Fig. 1 is a kind of interior layout schematic diagram of chip.Wiring area is divided into several types by the security level of chip internal structure, In cabling quantity and the security level in region be positively correlated.It can be used snakelike cabling in each wiring area, parallel cabling, The modes such as random hamiltonian circuit carry out wiring filling.Wherein, the random hamiltonian circuit image degree of disorder is high.Attack can be reduced Person determines protective layer cabling relationship by means such as image analyses, and decompiling difficulty is greatly improved, to prevent FIB modification protection Layer is attacked.
2. key area wiring method:
As shown in Fig. 2, the regions of four pieces of different degree of protection is divided into wiring, further according to the internal structure of chip, Chip module easily breaks through degree, region division is carried out to protective layer, and with A, B, C grade label, to distinguish these regions Protection level.Wherein, C region security grade is minimum, and B area safety coefficient is medium, a-quadrant safety coefficient highest.Such as Fig. 3 institute Show, after completing layout, metal routing filling is carried out to the region of various wirings security level.It can will be adjacent and safe etc. The lower wiring area of grade merges, and carries out unified wiring to these regions, is filled with the metal wire of large area.For compared with The wiring area of lower security grade can be used less equipotential line and be filled such as the region C in Fig. 3.For compared with high safety The wiring area of grade such as the B area in Fig. 3 carry out wiring filling using intensive metal wire.To security level highest in Fig. 3 A-quadrant, be routed using complicated random hamiltonian circuit.Another wire laying mode, can be to all areas in Fig. 3 It is all filled using random hamiltonian circuit, but is distinguished on the item number of cabling.In the region C, two random Kazakhstan are used Close circuit is routed, and for B area in Fig. 3, is routed using three parallel random hamiltonian circuits, in figure A-quadrant, be routed using four or more random hamiltonian circuits, and its individually designed figure.This method can be with Very big raising safety coefficient.
3. protective layer connection method:
After the completion of wiring area is planned, top layer regions overall routing figure can be obtained, as shown in Figure 4.Assuming that detection letter It number transmits from left to right, signal sends the monitoring signals that structure is sent and enters from the several nodes of left margin, passes through each wiring Metal routing in region, the output port for reaching right margin are connected with detection structure, and carry out pair with the original signal of input Than can determine whether under attack.If each port persistently has received detection signal, judge not under attack;If There is one or more signal deletion, region under attack can be judged according to the route of missing.
Before the present invention, the protection level of wiring area area and each region is first planned according to actual chips size, Top-level metallic shielded layer is divided into several wiring areas.Each routing cell is subjected to cloth further according to the safety coefficient of wiring area Line is filled, and the cabling quantity in each region is incremented by according to the rising of security level.Signal be will test after the completion from protective layer The input of left side certain port carry out the output of detection signal completely by wiring layer on right side, detect signal integrity, It can determine whether to receive attack, and can determine whether the region attacked.
Although invention has been described for the above method, the invention is not limited to above-mentioned specific embodiment, on The specific embodiment stated is only schematical, rather than restrictive, and those skilled in the art are of the invention Under enlightenment, many variations can also made without deviating from the spirit of the invention, these input protection of the invention it It is interior.

Claims (4)

1. the chip top-layer metal protection layer wiring method that a kind of pair of important area reinforces protection, characterized in that first according to practical Chip size plans the protection level of wiring area area and each region, and top-level metallic shielded layer is divided into several wiring regions Domain;Each routing cell is subjected to wiring filling further according to the safety coefficient of wiring area, the cabling quantity root in each region It is incremented by according to the rising of security level;It will test signal after the completion to input from the left side certain port of protective layer, completely pass through Wiring layer carries out the output of detection signal on right side, detects signal integrity, judge whether to receive attack, and judge to be attacked Region.
2. reinforcing important area the chip top-layer metal protection layer wiring method of protection, feature as described in claim 1 Be, specifically, top layer protective layer trace configurations method: can be used in each wiring area snakelike cabling, parallel cabling or with Machine hamiltonian circuit mode carries out wiring filling.
3. reinforcing important area the chip top-layer metal protection layer wiring method of protection, feature as described in claim 1 It is specifically, key area wiring method: wiring to be divided into the region of four pieces of different degree of protection, further according to chip Internal structure, chip module easily break through degree, region division are carried out to protective layer, and with A, B, C grade label, to distinguish this The protection level in a little regions;Wherein, C region security grade is minimum, and B area safety coefficient is medium, a-quadrant safety coefficient highest; After completing layout, metal routing filling is carried out to the region of various wirings security level: adjacent and security level is lower Wiring area merge, and unified wiring is carried out to these regions, is filled with the metal wire of large area, be filled equal electricity Gesture line number amount is successively successively decreased from high to low with safety coefficient;For the wiring area B area compared with high safety grade, using intensive Metal wire carries out wiring filling;To the highest a-quadrant of security level, it is routed using random hamiltonian circuit;Another cloth Line mode can all be filled all areas using random hamiltonian circuit, but distinguish on the item number of cabling;? The region C is routed using two random hamiltonian circuits, for B area, using three parallel random hamiltonian circuits into Row wiring, for a-quadrant, is routed, and its individually designed figure using four or more random hamiltonian circuits.
4. reinforcing important area the chip top-layer metal protection layer wiring method of protection, feature as described in claim 1 It is that specifically, protective layer connection method: signal sends the monitoring signals that structure is sent and enters from the several nodes of left margin, leads to The metal routing in each wiring area is crossed, the output port for reaching right margin is connected with detection structure, and original with input Signal compares, that is, can determine whether under attack;If each port persistently has received detection signal, judgement not by To attack;If there is one or more signal deletion, region under attack is judged according to the route of missing.
CN201811165211.5A 2018-09-30 2018-09-30 Reinforce important area the chip top-layer metal protection layer wiring method of protection Pending CN109585419A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811165211.5A CN109585419A (en) 2018-09-30 2018-09-30 Reinforce important area the chip top-layer metal protection layer wiring method of protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811165211.5A CN109585419A (en) 2018-09-30 2018-09-30 Reinforce important area the chip top-layer metal protection layer wiring method of protection

Publications (1)

Publication Number Publication Date
CN109585419A true CN109585419A (en) 2019-04-05

Family

ID=65920000

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811165211.5A Pending CN109585419A (en) 2018-09-30 2018-09-30 Reinforce important area the chip top-layer metal protection layer wiring method of protection

Country Status (1)

Country Link
CN (1) CN109585419A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110363032A (en) * 2019-07-24 2019-10-22 北京智芯微电子科技有限公司 The active shield layer circuit of safety chip
CN112182667A (en) * 2020-10-14 2021-01-05 大唐微电子技术有限公司 Multilayer metal protection structure, security chip and method for realizing chip protection
CN112257385A (en) * 2020-11-10 2021-01-22 深圳安捷丽新技术有限公司 Method, system and platform for carrying out physical protection design on key signals in SSD (solid State disk) main control chip
CN112669544A (en) * 2020-12-21 2021-04-16 福建新大陆支付技术有限公司 Novel safety cover plate wiring method and application thereof
CN112733486A (en) * 2021-01-20 2021-04-30 河南城建学院 Intelligent wiring method and system for chip design
CN114722767A (en) * 2022-05-13 2022-07-08 紫光同芯微电子有限公司 Method and device for security chip hybrid layout
US11977614B2 (en) 2021-09-20 2024-05-07 International Business Machines Corporation Circuit design watermarking

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080181409A1 (en) * 2007-01-31 2008-07-31 Zhuqiang Wang Method for guaranteeing security of critical data, terminal and secured chip
CN103646137A (en) * 2013-12-03 2014-03-19 北京中电华大电子设计有限责任公司 Method for designing high-safety chip active shielding physical protection structure
CN106227955A (en) * 2016-07-22 2016-12-14 天津大学 A kind of reconstructing method for chip top-layer metal protection layer

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080181409A1 (en) * 2007-01-31 2008-07-31 Zhuqiang Wang Method for guaranteeing security of critical data, terminal and secured chip
CN103646137A (en) * 2013-12-03 2014-03-19 北京中电华大电子设计有限责任公司 Method for designing high-safety chip active shielding physical protection structure
CN106227955A (en) * 2016-07-22 2016-12-14 天津大学 A kind of reconstructing method for chip top-layer metal protection layer

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110363032A (en) * 2019-07-24 2019-10-22 北京智芯微电子科技有限公司 The active shield layer circuit of safety chip
CN110363032B (en) * 2019-07-24 2021-03-12 北京智芯微电子科技有限公司 Active shielding layer circuit of safety chip
CN112182667A (en) * 2020-10-14 2021-01-05 大唐微电子技术有限公司 Multilayer metal protection structure, security chip and method for realizing chip protection
CN112257385A (en) * 2020-11-10 2021-01-22 深圳安捷丽新技术有限公司 Method, system and platform for carrying out physical protection design on key signals in SSD (solid State disk) main control chip
CN112669544A (en) * 2020-12-21 2021-04-16 福建新大陆支付技术有限公司 Novel safety cover plate wiring method and application thereof
CN112733486A (en) * 2021-01-20 2021-04-30 河南城建学院 Intelligent wiring method and system for chip design
US11977614B2 (en) 2021-09-20 2024-05-07 International Business Machines Corporation Circuit design watermarking
CN114722767A (en) * 2022-05-13 2022-07-08 紫光同芯微电子有限公司 Method and device for security chip hybrid layout

Similar Documents

Publication Publication Date Title
CN109585419A (en) Reinforce important area the chip top-layer metal protection layer wiring method of protection
US9940425B2 (en) Method and apparatus for camouflaging a standard cell based integrated circuit with micro circuits and post processing
US8151235B2 (en) Camouflaging a standard cell based integrated circuit
US11264990B2 (en) Physically unclonable camouflage structure and methods for fabricating same
US9355199B2 (en) Method and apparatus for camouflaging a standard cell based integrated circuit
US7308669B2 (en) Use of redundant routes to increase the yield and reliability of a VLSI layout
US7723998B2 (en) Integrated circuit protection and detection grid
US20180166399A1 (en) Layout-driven method to assess vulnerability of ics to microprobing attacks
Shi et al. A layout-driven framework to assess vulnerability of ICs to microprobing attacks
CN106227955A (en) A kind of reconstructing method for chip top-layer metal protection layer
CN107787499A (en) To prevent physics change and/or the IC chip protection of electricity change
CN107991572A (en) A kind of chip top-layer covering completeness protection method and device
Gao et al. iPROBE: internal shielding approach for protecting against front-side and back-side probing attacks
CN109933857A (en) The Clock Tree trunk Topology g eneration method and system of sensing integrated circuit layout information
Trippel et al. T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing
CN211878595U (en) SOC chip physics protection circuit
CN116995074A (en) IR Drop processing method and device and chip
CN110363032A (en) The active shield layer circuit of safety chip
CN114928500A (en) Attack detection method and device for data injection enabled power grid network parameters
JP2007035729A (en) Semiconductor integrated circuit device
Chen et al. Exploiting proximity information in a satisfiability based attack against split manufactured circuits
CN109815038A (en) Parity check fault injection detection method based on local rearrangement
CN211878594U (en) Chip physical protection circuit
Wang et al. Multi-pair active shielding for security IC protection
Hsu et al. Security-aware Physical Design against Trojan Insertion, Frontside Probing, and Fault Injection Attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190405

WD01 Invention patent application deemed withdrawn after publication