REFICS: Assimilating Data-Driven Paradigms Into Reverse Engineering and Hardware Assurance on Integrated Circuits

被引:9
作者
Wilson, Ronald [1 ]
Lu, Hangwei [1 ]
Zhu, Mengdi [1 ]
Forte, Domenic [1 ]
Woodard, Damon L. [1 ]
机构
[1] Univ Florida, Florida Inst Cybersecur Res FICS, Gainesville, FL 32601 USA
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Hardware; Integrated circuits; Trojan horses; Scanning electron microscopy; Tools; Taxonomy; Reverse engineering; Computer vision; dataset; deep learning; hardware assurance; image processing; integrated circuits; machine learning; reverse engineering; scanning electron microscopy; SECONDARY-ELECTRON EMISSION; SEM IMAGES; NOISE; DETECTOR; MODEL;
D O I
10.1109/ACCESS.2021.3114360
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Comprehensive hardware assurance approaches guaranteeing trust on Integrated Circuits (ICs) typically require the verification of the IC design layout and functionality through destructive Reverse Engineering (RE). It is a resource intensive process that will benefit greatly from the extensive integration of data-driven paradigms, especially in the imaging and image analysis phase. Although obvious, this uptake of data-driven approaches into RE-assisted hardware assurance is lagging due to the lack of massive amounts of high-quality labelled data. In this paper, a large-scale synthetic Scanning Electron Microscopy (SEM) dataset, REFICS, is introduced to address this issue. The dataset, the first open-source dataset in the RE community, consists of 800,000 SEM images over two node technologies, 32nm and 90nm, and four cardinal layers of the IC, namely, doping, polysilicon, contact and metal layers. Furthermore, a framework, based on uncertainty and risk, is introduced to compare the efficacy and benefits of existing RE workflows utilizing ad-hoc steps in its execution. These developments are critical in developing RE-assisted hardware assurance into a scalable, automated and fault-tolerant approach. Finally, the work is concluded with the performance analysis of existing machine learning and deep learning approaches for image analysis in RE and hardware assurance.
引用
收藏
页码:131955 / 131976
页数:22
相关论文
共 101 条
[1]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[2]   Real Image Denoising with Feature Attention [J].
Anwar, Saeed ;
Barnes, Nick .
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, :3155-3164
[3]  
Arazm N, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS AND COMPUTATIONAL INTELLIGENCE (CYBERNETICSCOM), P50, DOI 10.1109/CYBERNETICSCOM.2017.8311683
[4]  
Bao C, 2015, INT SYM QUAL ELECT, P47
[5]   On Reverse Engineering-Based Hardware Trojan Detection [J].
Bao, Chongxi ;
Forte, Domenic ;
Srivastava, Ankur .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (01) :49-57
[6]  
Batten C.F., 2000, THESIS U CAMBRIDGE C
[7]   LAYOUT RECONSTRUCTION OF COMPLEX SILICON CHIPS [J].
BLYTHE, S ;
FRABONI, B ;
LALL, S ;
AHMED, H ;
DERIU, U .
IEEE JOURNAL OF SOLID-STATE CIRCUITS, 1993, 28 (02) :138-145
[8]  
Chakraborty RS, 2009, LECT NOTES COMPUT SC, V5747, P396
[9]   Line roughness estimation and Poisson denoising in scanning electron microscope images using deep learning [J].
Chaudhary, Narendra ;
Savari, Serap A. ;
Yeddulapalli, Sai S. .
JOURNAL OF MICRO-NANOLITHOGRAPHY MEMS AND MOEMS, 2019, 18 (02)
[10]   A Hierarchical Multiclassifier System for Automated Analysis of Delayered IC Images [J].
Cheng, Deruo ;
Shi, Yiqiong ;
Gwee, Bah-Hwee ;
Toh, Kar-Ann ;
Lin, Tong .
IEEE INTELLIGENT SYSTEMS, 2019, 34 (02) :36-43