Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for preventing from active-attacking

A register and clock terminal technology, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problems of high cost and difficulty of reverse attack.

Active Publication Date: 2009-07-22
BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the second attack can fundamentally grasp the structure of the circuit and is more aggressive, the cost of implementation is high, and with the reduction of the process line width, the difficulty of reverse attacks is further increased, so attackers often use the first attack method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing from active-attacking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] The concrete operation of the present invention is as follows:

[0011] 1. Add the circuit in the figure to the circuit netlist

[0012] 2. When wiring, first arrange the connection between the register output terminal of the previous register and the clock terminal of the lower register on the top metal wiring layer of the chip. The wiring should cover a larger chip area as much as possible.

[0013] 3. After the shielded wires are laid, carry out the normal logic wiring, and complete the mixed wiring of the shielded wires and the normal logic.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a novel method for resisting active attack. Adopting the method in integrated circuit design can resist active attack to a certain degree and prevent an attacker from carrying out compulsive setting of a working circuit through active mode to change the operating mode of the circuit so as to decipher the circuit. The method adopts the lead wires of a set of serial register clock terminals to be winded irregularly on the top layer of a chip; when an external active probe touches the winding, the chip resets so as to resist external active attack.

Description

technical field [0001] This patent is applied in the field of integrated circuit chip security to prevent attackers from controlling the circuit through active detection, detecting the working process of the internal circuit, and strengthening the security of the chip. Background technique [0002] There are generally two ways to attack integrated circuits. One is active attack, that is, when the circuit is working, by using an active probe to detect the working process of the circuit, the working state of the circuit is forced to bypass the safety protection measures of the circuit. , in order to achieve the purpose of attacking the chip; the other is reverse dissection, which physically analyzes the chip layer by layer and proposes the netlist of the circuit. Although the second attack can fundamentally grasp the structure of the circuit and is more aggressive, the cost of implementation is high, and with the reduction of the process line width, the difficulty of reverse a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00H01L27/02H01L23/522H01L23/58G06F17/50
Inventor 叶茵
Owner BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD