CN108920982A - A kind of anti-tamper shielded layer for safety chip - Google Patents

A kind of anti-tamper shielded layer for safety chip Download PDF

Info

Publication number
CN108920982A
CN108920982A CN201810642276.8A CN201810642276A CN108920982A CN 108920982 A CN108920982 A CN 108920982A CN 201810642276 A CN201810642276 A CN 201810642276A CN 108920982 A CN108920982 A CN 108920982A
Authority
CN
China
Prior art keywords
tamper
line
shielded layer
functional
cabling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810642276.8A
Other languages
Chinese (zh)
Other versions
CN108920982B (en
Inventor
王良清
陈杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen State Micro Technology Co Ltd
Original Assignee
Shenzhen State Micro Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen State Micro Technology Co Ltd filed Critical Shenzhen State Micro Technology Co Ltd
Priority to CN201810642276.8A priority Critical patent/CN108920982B/en
Publication of CN108920982A publication Critical patent/CN108920982A/en
Application granted granted Critical
Publication of CN108920982B publication Critical patent/CN108920982B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Semiconductor Integrated Circuits (AREA)

Abstract

The invention discloses a kind of anti-tamper shielded layers for safety chip, it include anti-tamper line and functional line in the anti-tamper shielded layer, anti-tamper line is mutually mixed with functional line, the anti-tamper shielded layer includes at least two groups physics cabling, the anti-tamper line and the first functional line share wherein at least one group of physics cabling by way of time-sharing multiplex, remaining physics cabling is the combination of anti-tamper line perhaps the second functional line or anti-tamper line and the second functional line.The present invention makes anti-tamper design not only comprising simple anti-tamper function, while also having other logic functions by being mutually mixed the signal wire of key modules in safety chip as functional line and anti-tamper line.This method makes attacker be difficult to that anti-tamper shielded layer is individually removed, and prevents chip interior sensitive data from improving the security performance of chip because anti-tamper shielded layer is removed and anti-tamper function is by the leakage of key message caused by except energy.

Description

A kind of anti-tamper shielded layer for safety chip
Technical field
The present invention relates to chip secure technology, in particular to one kind can prevent attacker from detecting by the means such as FIB malice, Modify the circuit structure inside safety chip.
Background technique
Safety chip has been commonly stored the confidential information of client, such as bank card password, finger print information, DTV payment Information etc., therefore it is very important for the safety of this kind of chip.
In order to ensure the safety of this kind of chip, usually logically safety chip uses the Encryption Algorithm such as DES, AES, RSA It is encrypted and decrypted, as shown in Figure 4;And on physical Design level, generally use complicated metal routing covering chip list The mode of layer, constitutes anti-tamper shielded layer, detects the metal in this anti-tamper shielded layer by way of simulation or number Cabling, and final output one or multi-bit state position are to determine whether chip is tampered.
If attacker thinks the crucial signal of detection, it is necessary to bypass or cut off these anti-tamper shieldings for being located at chip top-layer Layer cabling, and these Wiring structures are usually relatively complex, and the spacing between metal routing is all very small.This anti-tamper screen It covers layer structure and is causing some difficulties to attacker to a certain degree, be that comparison is effective within the quite a long time in past A kind of guard method.
However as chip detection and the rapid development of reverse logic extractive technique, even extremely complex metal object Manage cabling, eda tool can be accurate, quickly, batch processing and sort out its logical relation, by these means, it is above-mentioned excessively The protected mode for relying on the complexity of anti-tamper shielded layer cabling can skip complicated physics Wiring structure, directly analyze it Logical relation, finding these crucial flag bits is no longer a very difficult thing.Once attacker analyzes anti-tamper patrol Volume or its final key point position, individually anti-tamper shielded layer cabling all can be removed, then force its flag bit Except energy, anti-tamper circuit will not play any protective effect.
Also have in the prior art and protected using anti-tamper logic, this increases attacker's parsing to a certain extent Difficulty, but after anti-tamper logic is by successful analysis, anti-tamper shielded layer can still be carried out forcing removal and will prevented Function is distorted except energy, safety chip is caused to lose protection.
Therefore, how to provide a kind of anti-tamper shielded layer of stronger attack protection of security performance is industry skill urgently to be resolved Art problem.
Summary of the invention
The present invention proposes a kind of anti-tamper shielded layer for safety chip to solve above-mentioned problem of the prior art, It include anti-tamper line and functional line in the anti-tamper shielded layer, anti-tamper line is mutually mixed with functional line.The present invention pass through by Anti-tamper line and functional line(Non-tamper-resistant function)Mixing, increases the difficulty that attacker releases anti-tamper function, solves mesh The problem of preceding tamper-resistance techniques security performance declines.
In the first embodiment of the technical program, the anti-tamper line and functional line are shared by way of time-sharing multiplex The Wiring structure of anti-tamper shielded layer.At a time, shared Wiring structure may be either anti-tamper logic, can also be other function It can logic.If attacker removes or disconnect by force these anti-shielding shielding constructions, the logic function of chip will be also resulted in not Correctly, some sensitive functions will be rejected execution, to achieve the purpose that protect chip interior sensitive information.
In the second embodiment of the technical program, the anti-tamper line and functional line are physics cabling independently, Anti-tamper line is mixed with functional line using identical Wiring structure.Using same structure, make attacker is more difficult which is distinguished It is anti-tamper line, which is other function line;Come even if analyzing, removing these physics cablings also can be very difficult, non- It is often easy to influence other function line.And these functional lines are once moved or destroy, it is incorrect to will lead to chip logic function, Equally can sensitive circuit not worked.
In the 3rd embodiment of the technical program, the anti-tamper shielded layer includes 3 or more mutually independent Physics cabling, and the structure of two of them physics cabling is identical, respectively corresponds anti-tamper line and functional line, is multiplexed by score After mode forms mixing cabling, is mixed with other physics cablings, the two ways of the first, second embodiment is combined, is made Security performance is higher.
When the anti-tamper shielded layer includes 2 or more mutually independent physics cablings, each physics cabling is at one Orthographic projection in plane is in square waveform, and each physics cabling intersects to form multilayered structure up and down.The functional line is safety The signal wire of chip.The signal of the signal wire is in the reset signal, enable signal, mode select signal of safety chip It is a kind of.
The present invention is by anti-tamper line and functional line(Non-tamper-resistant function)After mixing is realized, so that anti-tamper line and functional line (Non-tamper-resistant function)Monitoring mutually, gives mutual protection.Anti-tamper line not only protects chip, but also by functional line(Non-tamper-resistant Function)Protection, though anti-tamper circuit logic perhaps flag bit attacker is gone out by successful analysis can not easy removal or disconnected The cabling in these shielded layers is opened, anti-tamper safety itself is not only improved, also improves the security performance of chip entirety.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of first embodiment of the invention;
Fig. 2 is the structural schematic diagram of second embodiment of the invention;
Fig. 3 is the structural schematic diagram of third embodiment of the invention;
Fig. 4 is the partial process view of prior art des encryption logic;
Fig. 5 is the anti-tamper circuit flow chart of the prior art;
Fig. 6 is concrete application schematic diagram of the invention.
Specific embodiment
Below in conjunction with drawings and examples, the course of work that the present invention will be described in detail.
Anti-tamper shielded layer proposed by the present invention for safety chip, in addition to anti-tamper line in anti-tamper shielded layer, It is also provided with functional line, and anti-tamper line is mutually mixed with functional line.The present invention selects some key signals of safety chip Line is as functional line, once anti-tamper shielded layer is removed, these functions of safety chip will be destroyed, and chip interior is caused Sensitive function can not execute, thus prevent attacker attempt stolen in these function implementation procedures chip interior sensitive data or Capture sensitive information.
Some sensitive circuits of preferred security chip of the present invention or the reset signal of Key Circuit, enable signal, mode choosing The key signals such as signal are selected as functional line, and the signal wire of transmitting sensitive data should not be selected as functional line, present invention choosing Select at least one safety chip this functional line and anti-tamper line mixing cabling, once functional line attacker remove it is anti-tamper After being tampered in the operation of line, it will result directly in sensitive circuit and do not work, sensitive data is avoided to be leaked.
As shown in Figure 1, in the first embodiment of the present invention, functional line 103 and anti-tamper line in anti-tamper shielded layer 102 are logically mutually mixed, they share the Wiring structure of anti-tamper shielded layer by the way of time-sharing multiplex, i.e., anti- Distort the anti-tamper line 102 and functional line 103 of logic(Non-tamper-resistant function)It is multiple by one in the front end of anti-tamper shielded layer After logic module 104, the mixed output of physics cabling 106 is formed to anti-tamper shielded layer 101.Physics cabling after mixing 106 in the end of anti-tamper shielded layer after a demultiplexing logic module 105, distribute to anti-tamper logic 102 or function Line(Non-tamper-resistant function)103.After the cabling in anti-tamper shielded layer 101 is tampered or removes, anti-tamper line 102 and function Energy line(Non-tamper-resistant function)103 will all be destroyed.
As shown in Fig. 2, in the second embodiment of the present invention, anti-tamper line 202 and functional line(Non-tamper-resistant function)203 For physics cabling independently, they use same physics Wiring structure 203, and this structure plays a kind of physical mixed Effect, attacker is difficult to remove all anti-tamper lines 202 without destroying functional line(Non-tamper-resistant function)203.Once During removing anti-tamper line 202, functional line is destroyed(Non-tamper-resistant function)203, chip will be unable to starting sensitive circuit Work, to achieve the purpose that protect chip sensitive data.
As shown in figure 3, in the third embodiment of the present invention, combine physical mixed in the first, second embodiment and Logical hybrid two ways, anti-tamper shielded layer 301 include 3 or more mutually independent physics cablings, and two of them The structure of physics cabling is identical, respectively corresponds anti-tamper line and functional line, and mixing cabling 302 is formed in such a way that score is multiplexed Afterwards, it is mixed with other physics cablings 303.I.e. in anti-tamper shielded layer 301, exists simultaneously and generated using logical hybrid mode The cabling 303 for mixing physics cabling 302 and being generated using physical admixture.At a time, certain in anti-tamper shielded layer One cabling may be anti-tamper line, it is also possible to functional line(Non-tamper-resistant function), it is also possible to it is always functional line(It is non-to prevent usurping Change function).By such processing, even if attacker analyzes anti-tamper logic, can not all remove easily anti-tamper The cabling of shielded layer.
In the above-described embodiments, when anti-tamper shielded layer includes 2 or more mutually independent physics cablings, each physics is walked The shape of line can similar multiple zigzag shapes, i.e., orthographic projection in a plane is in square waveform, and each physics cabling phase up and down Mutually intersect to form multilayered structure.Functional line and anti-tamper line mixing cabling, the two are mutually protected, so that attacker is difficult to individually break Bad whole anti-tamper line is without destroying functional line, to achieve the effect that promote safety protection of chip ability.Desired value must be infused Meaning, for the walks wire shaped in anti-tamper shielding construction, in order to increase the difficulty that attacker analyzes logic, actual cabling Mode should be extremely complex, can choose multiple layer metal cabling, logically more than one.This example is intended merely to more clear table Up to the principle of the present invention, it is illustrated in such a way that a kind of comparison is concise.
It is shown in the prior art from Fig. 4, Fig. 5, we can see that enciphering and deciphering algorithm and anti-tamper circuit are separately to set Meter, for the prior art of Fig. 4 by taking des encryption as an example, DES full name is Data Encryption Standard, i.e. data encryption Standard is a kind of block algorithm encrypted using key, is determined as federal money by the State Standard Bureau of U.S. Federal Government within 1976 Expect processing standard(FIPS), then widespread comes in the world.In safety chip, this kind of symmetrical encryption and decryption of DES is commonly used Algorithm to carry out encrypting and decrypting to key message.Fig. 6 is illustrated of the invention specific based on the prior art of Fig. 4, Fig. 5 Application principle, it is assumed that anti-tamper shielded layer provides 32 physical shielding cablings, and principle according to the present invention will be in DES operation 32 in plain text input and anti-tamper circuit input signal carry out logical hybrid after, function select signal S be used to control what Kind logical signal is sent into anti-tamper shielded layer, starts in chip, or before progress encrypted message key decryption, S sets 1, starting Anti-tamper circuit logic carries out anti-tamper event detection;When needing to carry out encryption and decryption operation, S sets 0, and anti-tamper shielded layer is cut Change the data line in 32 DES operations into.Therefore, the logic in different moments, in the anti-tamper shielded layer of top layer It is different, for attacker, cannot simply modify final anti-tamper testing result and make its failure, because having modified most Whole state must destroy anti-tamper shielded layer, and this will lead to sometime, and chip not can be carried out normal encryption and decryption functions Operation, to protect key message.
It should be understood that the above-mentioned description for specific embodiment is more detailed, can not therefore be considered to this The limitation of invention patent protection range, scope of patent protection of the invention should be determined by the appended claims.

Claims (5)

1. a kind of anti-tamper shielded layer for safety chip, which is characterized in that comprising anti-tamper in the anti-tamper shielded layer Line and functional line, anti-tamper line are mutually mixed with functional line;
The anti-tamper shielded layer includes at least two groups physics cabling, and the anti-tamper line and the first functional line pass through time-sharing multiplex Mode share wherein at least one group of physics cabling, remaining physics cabling be anti-tamper line or the second functional line, Huo Zhefang Distort the combination of line and the second functional line.
2. anti-tamper shielded layer as described in claim 1, which is characterized in that the Wiring structure phase of the multiple groups physics cabling Together.
3. anti-tamper shielded layer as described in claim 1, which is characterized in that the orthographic projection of each physics cabling in a plane In square waveform, and each physics cabling intersects to form multilayered structure up and down.
4. anti-tamper shielded layer as described in claim 1, which is characterized in that the functional line, the first functional line, the second function Line is the signal wire of safety chip.
5. anti-tamper shielded layer as claimed in claim 4, which is characterized in that the signal wire, the first signal wire, second signal The signal of line transmission is that the reset signal of safety chip, enable signal, mode select signal one of are worked as.
CN201810642276.8A 2015-10-30 2015-10-30 Tamper-proof shielding layer for security chip Active CN108920982B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810642276.8A CN108920982B (en) 2015-10-30 2015-10-30 Tamper-proof shielding layer for security chip

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810642276.8A CN108920982B (en) 2015-10-30 2015-10-30 Tamper-proof shielding layer for security chip
CN201510721372.8A CN105224887B (en) 2015-10-30 2015-10-30 A kind of anti-tamper shielded layer for safety chip

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510721372.8A Division CN105224887B (en) 2015-10-30 2015-10-30 A kind of anti-tamper shielded layer for safety chip

Publications (2)

Publication Number Publication Date
CN108920982A true CN108920982A (en) 2018-11-30
CN108920982B CN108920982B (en) 2021-08-17

Family

ID=54993849

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201810642276.8A Active CN108920982B (en) 2015-10-30 2015-10-30 Tamper-proof shielding layer for security chip
CN201510721372.8A Active CN105224887B (en) 2015-10-30 2015-10-30 A kind of anti-tamper shielded layer for safety chip
CN201810642493.7A Active CN108985106B (en) 2015-10-30 2015-10-30 Tamper-proof shielding layer for security chip

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN201510721372.8A Active CN105224887B (en) 2015-10-30 2015-10-30 A kind of anti-tamper shielded layer for safety chip
CN201810642493.7A Active CN108985106B (en) 2015-10-30 2015-10-30 Tamper-proof shielding layer for security chip

Country Status (1)

Country Link
CN (3) CN108920982B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106777678A (en) * 2016-12-14 2017-05-31 天津蓝海微科技有限公司 A kind of effective ways of Security Chip Physical Protection wiring
CN108304736A (en) * 2018-02-09 2018-07-20 深圳国微技术有限公司 A kind of safety chip

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1200570A (en) * 1997-02-24 1998-12-02 通用仪器公司 Anti-tamper bond wire shield for integrated circuit
CN1268842A (en) * 1999-03-26 2000-10-04 日本胜利株式会社 Block noise detecting device and device for reducing block noise
EP1124330A2 (en) * 2000-02-09 2001-08-16 Algotronix Ltd. Method of using a mask programmed secret key to securely configure a field programmable gate array
CN2634530Y (en) * 2003-07-29 2004-08-18 上海原子核研究所日环仪器厂 Bus interface circuit
CN101470797A (en) * 2007-12-27 2009-07-01 飞力凯网路股份有限公司 Information processing device, communication method, and program product
CN101477505A (en) * 2008-12-23 2009-07-08 北京中星微电子有限公司 Data transmission method between master and slave equipments through bus
CN201477600U (en) * 2009-07-29 2010-05-19 深圳国微技术有限公司 Tampered detecting circuit for protecting chip
CN102937945A (en) * 2012-10-24 2013-02-20 上海新储集成电路有限公司 Method for reducing interconnection lines among chips during stacking plurality of chips up and down
CN103020822A (en) * 2012-12-04 2013-04-03 武汉擎动网络科技有限公司 Financial order-receiving method based on double secure channels
CN103034812A (en) * 2011-10-08 2013-04-10 国民技术股份有限公司 Compatible method, equipment of credible chip and usage method for equipment
CN103150069A (en) * 2013-03-01 2013-06-12 合肥京东方光电科技有限公司 Capacitance type in cell touch panel and display device
CN203084701U (en) * 2013-03-01 2013-07-24 合肥京东方光电科技有限公司 Capacitance embedded touch screen and display device
CN103646137A (en) * 2013-12-03 2014-03-19 北京中电华大电子设计有限责任公司 Method for designing high-safety chip active shielding physical protection structure
CN203535642U (en) * 2013-11-06 2014-04-09 昆腾微电子股份有限公司 Dynamic shielding protection device for secure chip
CN103779334A (en) * 2012-10-23 2014-05-07 北京同方微电子有限公司 Active protection device for smart card
US9041432B2 (en) * 2013-09-30 2015-05-26 Cavium, Inc. Clock multiplexing and repeater network
US9716552B2 (en) * 2012-07-31 2017-07-25 Acacia Communications, Inc. OTDM coherent transceiver

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2003015169A1 (en) * 2001-08-07 2004-12-02 株式会社ルネサステクノロジ Semiconductor device and IC card
WO2009073231A1 (en) * 2007-12-06 2009-06-11 Broadcom Corporation Embedded package security tamper mesh
CN202352033U (en) * 2011-10-26 2012-07-25 北华大学 Prisoner monitoring system based on Zigbee wireless network and GPRS (General Packet Radio Service) wireless network

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1200570A (en) * 1997-02-24 1998-12-02 通用仪器公司 Anti-tamper bond wire shield for integrated circuit
CN1268842A (en) * 1999-03-26 2000-10-04 日本胜利株式会社 Block noise detecting device and device for reducing block noise
EP1124330A2 (en) * 2000-02-09 2001-08-16 Algotronix Ltd. Method of using a mask programmed secret key to securely configure a field programmable gate array
CN2634530Y (en) * 2003-07-29 2004-08-18 上海原子核研究所日环仪器厂 Bus interface circuit
CN101470797A (en) * 2007-12-27 2009-07-01 飞力凯网路股份有限公司 Information processing device, communication method, and program product
CN101477505A (en) * 2008-12-23 2009-07-08 北京中星微电子有限公司 Data transmission method between master and slave equipments through bus
CN201477600U (en) * 2009-07-29 2010-05-19 深圳国微技术有限公司 Tampered detecting circuit for protecting chip
CN103034812A (en) * 2011-10-08 2013-04-10 国民技术股份有限公司 Compatible method, equipment of credible chip and usage method for equipment
US9716552B2 (en) * 2012-07-31 2017-07-25 Acacia Communications, Inc. OTDM coherent transceiver
CN103779334A (en) * 2012-10-23 2014-05-07 北京同方微电子有限公司 Active protection device for smart card
CN102937945A (en) * 2012-10-24 2013-02-20 上海新储集成电路有限公司 Method for reducing interconnection lines among chips during stacking plurality of chips up and down
CN103020822A (en) * 2012-12-04 2013-04-03 武汉擎动网络科技有限公司 Financial order-receiving method based on double secure channels
CN203084701U (en) * 2013-03-01 2013-07-24 合肥京东方光电科技有限公司 Capacitance embedded touch screen and display device
CN103150069A (en) * 2013-03-01 2013-06-12 合肥京东方光电科技有限公司 Capacitance type in cell touch panel and display device
US9041432B2 (en) * 2013-09-30 2015-05-26 Cavium, Inc. Clock multiplexing and repeater network
CN203535642U (en) * 2013-11-06 2014-04-09 昆腾微电子股份有限公司 Dynamic shielding protection device for secure chip
CN103646137A (en) * 2013-12-03 2014-03-19 北京中电华大电子设计有限责任公司 Method for designing high-safety chip active shielding physical protection structure

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韩军: "信息安全芯片的防御攻击技术研究", 《中国优秀博士学位论文全文库》 *

Also Published As

Publication number Publication date
CN105224887A (en) 2016-01-06
CN105224887B (en) 2019-03-15
CN108985106A (en) 2018-12-11
CN108920982B (en) 2021-08-17
CN108985106B (en) 2021-07-20

Similar Documents

Publication Publication Date Title
EP3454318B1 (en) Security system with entropy bits generated by a puf
US6973570B1 (en) Integrated circuit comprising encryption circuitry selectively enabled by verifying a device
KR101185371B1 (en) Mesh grid protection
EP3147830B1 (en) Protecting an integrated circuit
US10361873B2 (en) Test point-enhanced hardware security
US20110258459A1 (en) Method for protecting the decrypting of the configuration files for programmable logic circuits and circuit implementing the method
CN104573549A (en) Credible method and system for protecting confidentiality of database
Shen et al. A comparative investigation of approximate attacks on logic encryptions
US10291402B2 (en) Method for cryptographically processing data
Li et al. Scan chain based attacks and countermeasures: A survey
CN105224887B (en) A kind of anti-tamper shielded layer for safety chip
EP2819057B1 (en) Data processing system, method of initializing a data processing system, and computer program product
Chen et al. Hardware protection via logic locking test points
WO2015100158A1 (en) Implementations to facilitate hardware trust and security
CN106254059A (en) A kind of operation method and safety chip
Hamdioui et al. Hacking and protecting IC hardware
US20190042711A1 (en) Dynamic functional obfuscation
CN104376277B (en) Arithmetic unit, method and system
Gao et al. iPROBE-O: FIB-aware place and route for probing protection using orthogonal shields
Feix et al. Defeating iso9797-1 mac algo 3 by combining side-channel and brute force techniques
WO2020086087A1 (en) Integrated circuit(s) with anti-glitch canary circuit(s)
Zhang et al. Against fault attacks based on random infection mechanism
Peterson Developing tamper-resistant designs with ultrascale and ultrascale+ FPGAs
Ziad et al. E-voting Attacks and Countermeasures
CN110287708A (en) One Time Programmable encryption device and its encryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant