WO2005022635A1 - 半導体装置の保護回路およびこれを備えた半導体装置 - Google Patents
半導体装置の保護回路およびこれを備えた半導体装置 Download PDFInfo
- Publication number
- WO2005022635A1 WO2005022635A1 PCT/JP2004/012805 JP2004012805W WO2005022635A1 WO 2005022635 A1 WO2005022635 A1 WO 2005022635A1 JP 2004012805 W JP2004012805 W JP 2004012805W WO 2005022635 A1 WO2005022635 A1 WO 2005022635A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- protection circuit
- semiconductor device
- shielded wire
- shield
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
- H01L23/00—Details of semiconductor or other solid state devices
- H01L23/57—Protection from inspection, reverse engineering or tampering
- H01L23/576—Protection from inspection, reverse engineering or tampering using active circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
- G06F21/87—Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
- H01L2924/00—Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
- H01L2924/0001—Technical content checked by a classifier
- H01L2924/0002—Not covered by any one of groups H01L24/00, H01L24/00 and H01L2224/00
Definitions
- the present invention relates to a protection circuit for protecting confidential information inside a semiconductor device from analysis by unauthorized means, and a semiconductor device including the same.
- circuit information and internal information of semiconductor devices have been required to have a remarkable degree of confidentiality.
- semiconductor devices in the field of IC cards are characterized by their safety, it is necessary to protect important information from unauthorized analysis and prevent tampering and copying of internal information. Increasingly, measures are being taken to achieve such tight protection.
- the conventional technique will be described below.
- FIG. 14 shows the configuration of a conventional protection circuit.
- reference numeral 140 denotes a shield wire
- reference numeral 141 denotes a signal generator
- reference numeral 144 denotes a detector
- reference numeral 144 denotes a reference wiring
- reference symbol SO denotes an alarm signal.
- a shield line 140 is provided above the integrated circuit to be protected. Arbitrary signals are supplied from the signal generator 14 1 to the shield line 14 0 and the reference line 14 3, respectively. The signal supplied from the signal generator 141 is supplied to the detector 142 after passing through the shield wire 140 and the reference wiring 144, respectively.
- the detector 142 compares the signal supplied from the shield line 140 with the signal supplied from the reference line 144, and outputs an alarm signal S0 if a difference is recognized.
- the protected integrated circuit enters a safe mode in response to the alarm signal S 0, which makes illegal analysis and tampering virtually impossible (for example, see Table 2). No. 928 (Fig. 1)). Disclosure of the invention
- An object of the present invention is to provide a protection circuit having high tamper resistance and a semiconductor device having the same.
- the protection circuit according to the present invention includes at least one shield line that is wired so as to cover an area to be protected on a semiconductor device and has only one path from a start point to an end point, and that a signal is applied to a start point of the shield line.
- a signal generator to provide time measurement in response to a signal being provided by the signal generator to the beginning of the shielded wire, and in response to the signal reaching the end of the shielded wire.
- a comparator for comparing the time measured by the power counter with a reference value and outputting a fraud detection signal in accordance with the result of the comparison.
- the above protection circuit measures the propagation time of the signal transition transmitted through the shield line, stores the propagation time when the shield line is in a normal state in the non-volatile memory as a reference value, and makes a relative comparison with the reference value to determine the shield line path. It has the feature of detecting tampering.
- a signal transition is transmitted from the signal generator to the start point of the shielded wire, and the time counted by the power counter until the signal transition reaches the end point of the shielded wire is stored in the nonvolatile memory as normal state information (reference value). Store it. Then, when the semiconductor device is started up or in a standby state, the signal transition delay time is measured again, and a reference value of the normal state stored in advance in the nonvolatile memory is referred to, and the shielded wire in the operation assurance environment is referred to. Allow physical property fluctuation A comparison operation considering the error is performed by a comparator.
- the shielded wire can be shielded by FIB processing technology or other appropriate means without deterring physical analysis.
- the problem is solved by reconnecting the wire or detecting that the conductor line is connected to the shielded wire by bypassing the conductor path.
- Another protection circuit according to the present invention is a protection circuit for the semiconductor device. At least one shielded wire pair that is wired so as to cover the area to be covered, one of which has the same shape and the same length, and one of which has only one path from the start point to the end point.
- a signal generator for providing a potential at one of the start points of the shield line pair and the other end point, and a potential difference between one end point and the other end point of the shield line pair is compared with a reference value. Based on the results and a detector for outputting a fraud detection signal.
- the protection circuit has the characteristic of detecting tampering of the shielded line by monitoring the offset change of the resistance characteristic of the two shielded lines with the same physical characteristics.
- the resistance characteristics of the shielded wire pairs can be made uniform.
- Supply an arbitrary voltage from the constant voltage source convert the difference between the resistance characteristics of the pair of shielded wires into an offset using an operational amplifier, and refer to the voltage from another constant voltage source considering the initial offset of the operational amplifier.
- a protection circuit that easily detects falsification of the shielded wire by realizing it as a voltage and comparing it with the extracted threshold voltage is realized.
- FIB processing technology etc.
- the shield line configuration becomes easy. Even if the change in the route of the shielded wire pair is accidentally or intentionally reconnected by a route that makes the resistance characteristics of the two shielded wires of the pair the same, Since the semiconductor resistor is protected by the shielded wire, it is difficult to change the resistance of the semiconductor resistor from the outside, and the tamper resistance can be remarkably improved.
- Still another protection circuit according to the present invention is wired so as to cover an area to be protected on the semiconductor device, one of the protection circuits has the same shape and the same length, and the other has a path from a start point to an end point. And at least one shield line pair each of which has only one, a signal generator for supplying in-phase pulses to one and the other start points of the shield line pair, one end point of the shield line pair and the other And a detector for comparing a phase difference between the end point of the second and the reference value and outputting a fraud detection signal based on the comparison result.
- the above-mentioned protection circuit has the characteristic that it supplies pulses of the same phase to two shielded wires with the same physical characteristics and evaluates the phase difference to detect tampering of the shielded wires.
- Pulses of the same phase are simultaneously given to the shielded wire pair with an arbitrary pulse width from the pulse generator.
- the phase comparator extracts the phase difference between the two shielded wires as a pulse.
- a protection circuit that easily detects tampering of the shield wire is realized.
- FIB processing technology or other appropriate means. The problem is solved by reconnecting the shielded wire in a bypass route that does not hinder the physical analysis, or by detecting that the conductor wire is connected to the shielded wire by bypassing the conductor from outside.
- the above-described protection circuit is basically a circuit that monitors and evaluates a shielded line or a pair of shielded lines for one path, and requires a plurality of detection units to detect a plurality of paths at once, thus increasing the area of the layout. I do. By detecting one path at a time while switching the path of the shielded line or shielded line pair with the switching circuit, the detection unit can share all the paths for one path, reducing the layout area. Can be eliminated.
- a signal supplied from the signal generator to the shielded line or the shielded line pair is supplied with a true signal only to a path for detecting the signal, and a false signal is supplied to other paths, and the signal is supplied in accordance with the path switching of the switching circuit. By also changing the signal supply path, it is possible to observe the signal of the shield line from the outside, make it difficult to specify the signal pattern, and improve the tamper resistance.
- two sets of two shielded wire pairs with the same physical characteristics are prepared, and a pulse with the same phase and a pulse with a different net difference are supplied to each pair, and the phase difference is encoded to form a signal pattern. It may be converted and compared with the reference signal pattern.
- the pulse generator From the pulse generator, distribute the pulses of the same phase as the pulses of the same phase with the pulses of the same phase through the switching circuit for each shielded wire pair according to the signal pattern from the signal pattern generator, and then compare the phases.
- the in-phase pulse and the pulse with a sufficient difference are converted into 0 and 1 signal patterns and supplied to the comparator.
- a protection circuit that easily detects tampering of the shield wire is realized, and the shield wire is partially replaced.
- the shielded wire After cutting or peeling, the shielded wire must be reconnected by a FIB processing technique or other appropriate means or by appropriate means without deteriorating the physical analysis, or connected to the shielded wire from outside using a conductor path as a bypass. Detecting and Solving the Problem
- This protection circuit overcomes the vulnerability of phase difference detection when the same phase signal is applied to all shield lines from the outside, accidentally or intentionally. Further, by changing the pattern generation every time, even if the signal of the shielded wire pair can be observed from the outside, it becomes difficult to imitate the signal, and the tamper resistance can be remarkably improved.
- a signal of 0 or 1 is supplied from the signal generator for each route of the shielded wire, and is supplied to the match / mismatch determiner via the switching circuit.
- a comparison signal from the signal generator to the match Z mismatch judgment unit with the wiring protected by the shield wire, and judging match / mismatch, disconnection of the shield wire ⁇ peeling ⁇ short circuit abnormality To detect.
- the signal supplied from the signal generator is inverted or changed every time, and the comparison is repeated a plurality of times, so that the signal on the shield wire can be observed from the outside or the signal can be supplied to the shield wire by accident. Can be difficult to match.
- the switching circuit is switched, and any of the above protection circuits detects the falsification of the shield line path.
- the shield wire can be reconnected by a FIB processing technique or other appropriate means or other appropriate means in a bypass route that does not hinder the physical analysis, or the conductor wire can be externally connected to the shield wire as a bypass. Detects connection and solves the problem. Furthermore, since different detection means are implemented in combination, it is more difficult to analyze various fraudulent acts, and tamper resistance can be improved.
- the detection signal may be evaluated by a failure diagnostic device to detect a detector failure or an illegal act on the detector. If the node of the unauthorized detection signal of the protection circuit is specified, the shield wire or shielded wire pair is peeled off, and the unauthorized detection node also exerts the protection effect against unauthorized acts that always give a fixed potential that is normal to the unauthorized detection node A protection circuit with higher tamper resistance can be provided.
- the shield wire (pair) in the above protection circuit be wired so as to cover the entire semiconductor device except the PAD. This makes it difficult to perform an illegal analysis on the semiconductor device without removing the shield wire. Also, the minimum wiring allowed in manufacturing Wiring with width and spacing makes it difficult to form a PAD with a connection to the lower layer, making holes between and above the shield line without cutting the shield line even with FIB processing technology, At the same time, because the width of the shield wire is narrower than the microprobe terminal by + minutes, it is difficult to set up the terminal, and it is also difficult to connect to the shield wire from outside.
- complicated wiring can be realized by making full use of 90-degree wiring, 45-degree wiring, 90-degree wiring with 45-degree traveling direction, or a combination of these wirings.
- the shape and path make it difficult to trace the shield line path. From the above, it is possible to provide a protection circuit with significantly improved tamper properties.
- the semiconductor device is equipped with the protection circuit described above, monitors tampering of the shield line, and when an abnormality is captured, outputs a fraud detection signal to prevent unauthorized analysis of the semiconductor device and falsification of information. Perform the operation. Thereby, tamper resistance can be improved.
- the semiconductor device shifts to a mode in which an operation such as a reset that can be canceled when power supply is cut off is fixed based on the fraud detection signal. After that, if the falsification of the shielded wire is detected several times in succession, the physical characteristics of the semiconductor device fluctuate due to changes in the operating environment and other factors due to control such as erasing the memory contents. It is possible to avoid the loss of memory contents and the inability to restart due to erroneous detection, and the practicality increases.
- FIG. 1 is a diagram illustrating a configuration of a protection circuit according to the first embodiment.
- FIG. 2 is a diagram schematically showing a cross-sectional structure of the semiconductor device mounted with the protection circuit shown in FIG.
- FIG. 3 is a diagram showing a schematic configuration of the semiconductor device shown in FIG.
- FIG. 4 is a diagram illustrating a wiring example of a shield line.
- FIG. 5 is a diagram showing a modification of the protection circuit shown in FIG.
- FIG. 6 is a diagram illustrating a configuration of a protection circuit according to the second embodiment.
- FIG. 7 is a diagram illustrating a modification of the protection circuit illustrated in FIG.
- FIG. 8 is a diagram illustrating a configuration of a protection circuit according to the third embodiment.
- FIG. 9 is a timing chart for explaining the operation of the protection circuit shown in FIG.
- FIG. 10 is a diagram showing a modification of the first to third embodiments.
- FIG. 11 is a diagram illustrating a configuration of a protection circuit according to the fourth embodiment.
- FIG. 12 is a diagram illustrating a configuration of a protection circuit according to the fifth embodiment.
- FIG. 13 is a diagram showing a modification in which a failure diagnostic device is provided.
- FIG. 14 is a diagram showing a configuration of a conventional protection circuit. BEST MODE FOR CARRYING OUT THE INVENTION
- FIG. 1 shows the configuration of the protection circuit according to the first embodiment.
- This protection circuit is mounted on a semiconductor device and is intended to protect confidential information inside the semiconductor device from analysis by unauthorized means.
- This protection circuit includes a signal generator 1, a shield line 2, a control circuit 6, and a detector 10.
- the detector 10 includes a counter 3, a comparator 4, and a nonvolatile memory 5.
- the shield line 2 is a metal of the uppermost layer in the manufacture of a semiconductor device, and is wired so as to cover a semiconductor device region (protected region) which needs to be protected and which is sufficient.
- the shield line 2 is wired in a one-stroke topology, and has only one route from the start point SP 1 to the end point GP 1.
- the control circuit 6 supplies a control signal S 21 to the signal generator 1 and the counter 3.
- the signal generator 1 gives a signal transition from 0 to 1 or a signal transition from 1 to 0 to the start point SP 1 of the shield line 2 in response to the control signal S 21 from the control circuit 6.
- counting of the clock pulse CLK starts in response to the control signal S21 from the control circuit 6, and in response to the arrival of the signal transition to the end point GP1 of the shield line 2, the clock pulse CLK starts. End the count.
- the counter 3 supplies the count value to the non-volatile memory 5 or the comparator 4 when the counting is completed.
- the nonvolatile memory 5 stores the count value from the counter 3 as a reference value.
- the comparator 4 compares the count value from the counter 3 with the reference value stored in the nonvolatile memory 5, and outputs a fraud detection signal S1 according to the result of the comparison.
- FIG. 2 schematically shows a cross-sectional configuration of a semiconductor device on which the protection circuit shown in FIG. 1 is mounted.
- a device element 21 is formed on a semiconductor substrate 20, a plurality of wiring layers 22 are formed thereon, and a shield wiring layer 23 is formed on the uppermost layer. ing.
- the shield line 2 shown in FIG. 1 is formed in the shield wiring layer 23 and is wired so as to cover the protection region 24 (including the device element 21 and the wiring layer 22).
- the circuit elements that make up the signal generator 1, counter 3, comparator 4, non-volatile memory 5, and control circuit 6 shown in Fig. 1 are formed by device elements 21 and the wirings 11 to 18 that connect these elements. Is formed by the wiring layer 22. That is, the signal generator 1, the counter 3, the comparator 4, the nonvolatile memory 5, the control circuit 6, and the wirings 11 to 18 connecting these are protected by the shielded wire 2.
- the fraud detection signal S1 from the detector 10 of the protection circuit is supplied to the functional module 25 of the semiconductor device 30 as shown in FIG.
- the circuit elements constituting the functional module 25 are formed by the device elements 21, and the wiring connecting them is formed by the wiring layer 22. That is, the functional module 25 is protected by the shield wire 2.
- a signal transition from 0 to 1 or a signal transition from 1 to 0 is supplied from the signal generator 1 to the start point SP 1 of the shield wire 2 at the factory inspection until it reaches the power counter 3 via the shield wire 2.
- the quick pulse CLK in the semiconductor device is counted by the counter 3 and the obtained force value is stored in the nonvolatile memory 5 as reference information.
- signal generator 1 transitions from 0 to 1 to the starting point SP 1 of shield wire 2 or Supplies the signal transition from 1 to 0, counts the clock pulse CLK with the counter 3 until it reaches the power counter 3 via the shield line 2, and stores it in the nonvolatile memory 5 in advance with the obtained count value.
- the comparator 4 compares the received reference information with each other, and if they do not match, outputs an illegal detection signal S1. At the time of comparison, a function to consider the fluctuation of the physical characteristics of the shielded wire 2 in the operation assurance environment at the time of the comparison calculation is added.
- one shield wire 2 is used, but a plurality of shield wires 2 may be provided, and a signal generator 1 and a detector 10 may be provided for each shield wire 2. Further, as shown in FIG. 4, one shield line 2 may be branched in the middle, and a detector 10 may be provided for each of the end points GP 1 and GP 2.
- there are multiple routes for shielded wire 2 here, two routes, P 1 and P 2). Looking at route P 1, there is only one route from start point SP 1 to end point GP 1. Looking at P2, there is only one route from the start point SP1 to the end point GP1.
- a configuration may be adopted in which the clock pulse CLK is supplied from the dedicated oscillator 7 to the counter 3.
- the measurement accuracy of the signal transition delay time can be freely created.
- the basic clock of the semiconductor device is supplied from the outside, there is a possibility that an illegal means for adjusting the cycle of the external clock to adjust the number of pulses may be taken.
- the dedicated oscillator 7 inside the semiconductor device, it is difficult to change the pulse period from the outside, and the tamper resistance can be remarkably improved.
- FIG. 6 shows the configuration of the protection circuit according to the second embodiment.
- This protection circuit is mounted on a semiconductor device and is intended to protect confidential information inside the semiconductor device from analysis by unauthorized means.
- This protection circuit includes a signal generator 31, a shielded wire pair (2a, 2b), and a detector 40.
- the detector 40 includes an operational amplifier 32, a reference voltage source 33, and a comparator.
- the shield wire pair (2a, 2b) is the uppermost metal in the semiconductor device manufacturing, and is wired so as to cover the necessary and sufficient semiconductor device area (protected area) that needs to be protected. .
- the shield wire 2a and the shield wire 2b have the same shape and the same length.
- the shield line 2a is wired in a single-stroke topology, and has only one route from the start point SP1a to the end point GP1a.
- the shield line 2b is wired in a one-stroke topology, and has only one route from the start point SP1b to the end point GP1b.
- the signal generator 31 applies a voltage V0 to the starting point (SP1a, SP1b) of the shielded wire pair (2a, 2b).
- the operational amplifier 32 amplifies and outputs the difference between the voltage V1 at the end point GP1a of the shield line 2a and the voltage V2 at the end point GP1b of the shield line 2b.
- the reference voltage source 33 outputs a reference voltage of a predetermined level.
- the comparator 34 compares the output of the operational amplifier 32 with the reference voltage from the reference voltage source 33, and outputs the fraud detection signal S1 according to the comparison result.
- the protection circuit shown in FIG. 6 is mounted. The outline of the cross-sectional configuration of the semiconductor device is the same as that shown in FIG.
- the shield line pair (2a, 2b) shown in FIG. 6 is formed in the shield wiring layer 23 and is wired so as to cover the protection region 24 (including the device element 21 and the wiring layer 22).
- the circuit elements constituting the signal generator 31, the operational amplifier 32, the reference voltage source 33, and the comparator 34 shown in FIG. 6 are formed by the device element 21, and the wirings 41 to 47 for connecting these are formed by the wiring layer 22. I
- An arbitrary voltage V0 is applied to the starting point (SP1a, SP1b) of the shielded wire pair (2a, 2b) by the signal generator 31, and the operational amplifier 32 is connected to the shielded wire pair (2a, 2b).
- Extract the offset of the resistance characteristics by voltage and manufacture the initial offset of the operational amplifier 32 and comparator 34 A voltage corresponding to the error is generated as a reference voltage from the reference voltage source 33, and is compared with the offset voltage (output of the operational amplifier 32) in the comparator 34. If the offset voltage exceeds the reference voltage, Issue the fraud detection signal S1. As described above, this embodiment easily realizes tampering detection of the shielded line pair (2a, 2b).
- one or more shielded wire pairs (2a, 2b) may be used, and the operational amplifier 32 and the shielded wire pair (2a, 2b) may be connected within one shielded wire pair (2a, 2b).
- a plurality of sets of the comparators 34 may be appropriately arranged in a distributed manner to make it difficult to perform illegal acts based on external physical property measurement and to improve tamper resistance.
- a semiconductor resistor 35 may be provided instead of one of the shielded wire pairs 2b.
- the semiconductor resistor 35 is formed in the protection area 24 shown in FIG. 2 and has the same resistance as the shield wire 2a.
- the shielded wire is formed. The routing of 2a becomes easy because it is not necessary to route two wires in pairs with the same shape and the same wiring length.
- the change in the path of the shielded wire pair (2a, 2b) is changed by the resistance of the two shielded wires (2a, 2b).
- the protection circuit shown in Fig. 7 has a semiconductor resistor 35 whose one pair is protected by shielded wire 2a. Therefore, it is difficult to change the resistance value of the semiconductor resistor 35 from the outside, so that it is possible to provide a protection circuit having a greater protection effect.
- FIG. 8 shows the configuration of the protection circuit according to the third embodiment.
- This protection circuit is mounted on a semiconductor device and is intended to protect confidential information inside the semiconductor device from analysis by unauthorized means.
- This protection circuit includes a signal generator 51, a shielded wire pair (2a, 2b), and a detector 60.
- Detector 60 includes a phase comparator 52, a filter circuit 53, and a determiner 54.
- FIG. 2 shows a schematic cross-sectional configuration of a semiconductor device on which the protection circuit shown in FIG. 8 is mounted. It is the same as
- the shield wire pair (2a, 2b) shown in FIG. 8 is formed in the shield wiring layer 23, and is wired so as to cover the protection region 24 (including the device element 21 and the wiring layer 22).
- the circuit elements constituting the signal generator 51, the phase comparator 52, the filter circuit 53, and the judgment unit 54 shown in FIG. 8 are formed by the device element 21, and the wirings 41 to 44 and 61 to 63 for connecting them are The wiring layer 22 is formed.
- the signal generator 51 simultaneously supplies pulses of the same phase with an arbitrary pulse width to the starting point (SP1a, SP1b) of the shielded wire pair (2a, 2b).
- Figure 9 shows a simple waveform timing diagram for the phase difference.
- c is an input pulse to the shielded wire pair (2 a, 2 b)
- d is a pulse immediately before the phase comparator 52
- e is an output of the phase comparator 61
- f is an output of the filter circuit 53.
- the phase difference between the two shielded pulses is extracted as a pulse in the phase comparator 52, but as shown in A1 in Fig. 9, the pulse d immediately before the phase comparator 52 is a shield that cannot be avoided in manufacturing.
- a slight phase difference appears as an error due to a difference in physical characteristics due to a difference in the shape of the protected semiconductor device through which the wire pair (2a, 2b) passes. This difference increases when the route of the shielded wire pair (2a, 2b) is altered.
- the phase comparator 52 a pulse having a pulse width corresponding to the phase difference is output. If it is a normal shielded wire, it will appear as a very short pulse (output e at A1 in Fig. 9), but if the path is altered, the pulse width will increase (output e at A2 in Fig. 9).
- This pulse is input to a filter circuit 53, and a pulse having a short initial phase difference is removed by a filter function.
- the remaining pulse is detected, and an erroneous signal S1 is output from the decision unit 54.
- falsification detection of the shielded wire pair (2a, 2b) is easily realized.
- one or more shielded wire pairs (2a, 2b) may be provided, and the phase comparator within one shielded wire pair (2a, 2b) may be used.
- 52, the filter circuit 53, and the judging unit 54 may be combined into one set to appropriately disperse them to make it difficult to perform wrongdoing based on external physical property measurement and improve tamper resistance.
- FIG. 10 shows a modification of the first to third embodiments.
- the protection circuit shown in FIG. And two or more shielded wire pairs (2a, 2b).
- the signal generators 1, 31, and 51 and the switching circuit 61 are connected to a plurality of shielded wires 2 or a plurality of shielded wire pairs (2a, 2a, 2b).
- 2 b) Start points SP 1 to SP n, (SP 1 a, SP 1 b) to (SP na, SP nb) and end points GP 1 to G Pn, (GP 1 a, GP 1 b) to (GP na , GP nb), and to one of the detectors 10, 40, 60 of one of the first to third embodiments for one path via a switching circuit 61.
- the switching circuit 61 switches the connection of the shielded wire 2 or the shielded wire pair (2a, 2b) to the detectors 10, 40, and 60 in order, one by one, and monitors and evaluates tampering of the shielded wire route by one route. If tampering is recognized, a fraud detection signal S1 is output.
- Signal generators 1, 31, and 51, switching circuit 61, and detectors 10, 40, and 60 are protected by shielded wire 2 or shielded wire pairs (2a, 2b). The wiring connecting them is also protected by shielded wire 2 or shielded wire pair (2a, 2b).
- Signal generators 1, 31, and 51 supply a true signal for detecting falsification of shielded wire 2 or shielded wire pair (2a, 2b) to only one of a plurality of routes, and to other routes. Supplies false signals.
- the switching circuit 61 is connected to any one of the detectors 10, 40, and 60 of the first to third embodiments for the $ 1 path to detect falsification of the path. Do. This repetition is performed for all routes in order.
- the switching control signal S 2 for operating the switching circuit 61 in synchronization with the path to which the signal generators 1, 31, and 51 have supplied the true signal is supplied to the switching circuit 61 to perform synchronization control.
- FIG. 11 shows the configuration of a protection circuit according to the fourth embodiment.
- This protection circuit has multiple Here, n pairs of shielded wires (2a, 2b), a signal generator 51, a switching circuit 73, a signal pattern generator 72, and a detector 70 are provided.
- the detector 70 includes a plurality (n) of phase comparators 52, a plurality (n) of filter circuits 53, and a comparator 71.
- the present embodiment is a shield line of the same shape and the same length, which is a metal of the uppermost layer in the manufacture of a semiconductor device and is wired so as to cover a necessary and sufficient semiconductor device region which needs to be protected.
- It has a plurality of shielded wire pairs (2a, 2b) consisting of two wires, and the signal generator 51 and the starting point (SP1a, SP1b) of the shielded wire pair (2a, 2b) ⁇ (SPna, SPnb) are connected via the switching circuit 73, and the end points (GP1a, GP1b) to (GPna, GPnb) are connected to the corresponding phase comparators 52, respectively.
- the output of the phase comparator 52 passes through the filter circuit 53 and is supplied to the comparator 71.
- the signal pattern generator 72 supplies the signal pattern S 3 to the switching circuit 73 and the comparator 71 via the wiring protected by the shielded wire pair (2a, 2b).
- the configuration is such that the fraud detection signal S1 is output.
- the signal generator 51, the switching circuit 73, the signal pattern generator 72 and the detector 70 are protected by shielded wire pairs (2a, 2b), and the wiring connecting them is also shielded wire pairs (2a, 2b). b) is protected by
- the signal generator 51 distributes the pulse of the same peer and the pulse with a sufficient phase difference according to the signal pattern S3 from the signal pattern generator 72, and switches the shielded pair for each shielded wire via the switching circuit 73.
- the in-phase pulse and the pulse with a sufficient phase difference are converted into 0 and 1 signal patterns by passing through a phase comparator 52 and a filter circuit 53 for removing the initial phase difference, and the comparator 71 To supply.
- the pattern signal S3 generated by the signal pattern generator 72 is used as a reference signal, sent to the comparator 71 via a wire protected by the shielded wire pair (2a, 2b), and compared with the signal. Release S1.
- the present embodiment easily realizes tampering detection of the shielded wire pair (2a, 2b). Furthermore, this protection circuit overcomes the vulnerability of detecting the phase difference when the same phase signal is applied to all the shield wires from the outside by accident or intentionally, and changes the generation pattern S3 every time. Even if the signal of the shielded wire pair (2a, 2b) can be observed from the outside by adopting a configuration such as this or using the signal pattern generator 72 as a random number generator, the signal should be imitated. Becomes difficult, and the tamper resistance can be remarkably improved.
- the signal supplied to the shielded wire pair (2a, 2b) is kept at a fixed potential of V ss, and the same detection method is used during operation to make the shielded wire pair
- the cutting and peeling of (2a, 2b) can be constantly monitored even when the semiconductor device is not activated or in standby, and the tamper resistance can be significantly improved.
- FIG. 12 shows the configuration of a protection circuit according to the fifth embodiment.
- This protection circuit consists of a plurality (here, n) of shielded wires 2 or a plurality (n) of shielded wire pairs (2a, 2b), signal generators 1, 31, 51, a switching circuit 61, , A match / mismatch determiner 81, detectors 10, 40, 60, and an OR circuit 82.
- a plurality of shielded wires 2 or a plurality of shielded wire pairs are arranged so as to cover a necessary and sufficient semiconductor device region which needs to be protected by the uppermost metal in the semiconductor device manufacturing. 2a, 2b), and connect the signal generators 1, 31, and 51 and the switching circuit 61 to the start and end points of the shielded wire 2 or the shielded wire pair (2a, 2b).
- the signal generators 1, 31, and 51 and the switching circuit 61 to the start and end points of the shielded wire 2 or the shielded wire pair (2a, 2b).
- the signal generators 1, 31, and 51 are connected to the match Z mismatch judgment unit 81 with the wiring protected by the shielded wire, and the match / mismatch of the signal supplied to the match / mismatch judgment unit 81 is judged and illegal detection is performed.
- the signal S5 is output, and detectors 10 and 4
- a fraud detection signal S1 is output from 0 and 60.
- a fraud detection signal S11 is output.
- switching circuit 61, match / mismatch detector 81, detectors 10, 40, 60 and OR circuit 82 are protected by shielded wire 2 or shielded wire pair (2a, 2b). Are also protected by shielded wire 2 or shielded wire pair (2a, 2b).
- a signal of 0 or 1 is supplied from signal generators 1, 31, and 51 for each route of shielded wire 2 or shielded wire pair (2a, 2b), and is supplied to match Z mismatch determiner 81 via switching circuit 61
- the comparison signal from the signal generators 1, 31, and 51 to the match / mismatch judgment unit 81 with the wiring protected by the shielded wire 2 or the shielded wire pair (2a, 2b).
- / Judge for mismatch As a result, the disconnection, peeling, and short-circuit abnormality of the shielded wire 2 or the shielded wire pair (2a, 2b) is detected, and the illegal detection signal S5 is output.
- the signals supplied from the signal generators 1, 31, and 51 are inverted or changed every time, and the comparison is repeated a plurality of times, so that the signals can be observed from the outside or the signals can be supplied and Can be prevented from matching.
- signal generators 1, 31, and 51 as random number generators is also a good way to improve tamper resistance. If no abnormality is detected by the above detection method, the switching circuit 61 is switched, and the detectors 10, 40, and 60 detect tampering of the shielded wire path, and output the fraud detection signal S1. When either the fraud detection signal S5 or the fraud detection signal S1 detects fraud, the fraud detection signal S11 is output.
- the present embodiment easily realizes tampering detection of the shielded wire 2 or the shielded wire pair (2a, 2b).
- different detection means are implemented in combination, it becomes more difficult to analyze various frauds, and tamper resistance can be remarkably improved.
- FIG. 13 shows an application example of the first to fifth embodiments.
- FIG. 13 shows only a part of the configuration of the first to fifth embodiments.
- the detectors 10, 40, and 60 of the protection circuits in the first to fifth embodiments are connected to shielded lines (input signal lines 92, control signal lines 92).
- the fault diagnostic device 91 is connected via the fraud detection signal S1).
- the fraud detection signal S1 is supplied to the failure diagnostic device 61, and a failure detection signal S6 indicating the result of the failure diagnosis is output from the failure diagnostic device 91.
- Fault diagnostic device 91 is protected by shielded wire 2 or shielded wire pair (2a, 2b).
- the fault detector 91 evaluates the fraud detection signal S1 output from the output units 10, 40, and 60. For example, by comparing the expected values obtained from the information supplied to the detectors 10, 40, 60, etc., the failure of the detectors 10, 40, 60 or the detectors 10, 40, 60, Detects misconduct to 60 and outputs failure detection signal S6. This failure diagnosis is performed before the falsification of shielded wire 2 or shielded wire pair (2a, 2b) is detected.
- shielded wire 2 or shielded wire pair (2a, 2b) is detected. Shift to falsification detection.
- the semiconductor device is not operated immediately. For example, it is safe to delete important information such as memory information so that it will not operate again.
- the node of the unauthorized detection signal S1 of the protection circuit is specified, and the shield wire or shield wire pair is peeled off, and the protection effect is also exerted against an illegal act of applying a fixed potential to that node.
- a protection circuit with higher tamper resistance can be realized.
- the protection circuits of the first and third embodiments perform a detection operation when the semiconductor device is started and in a standby state, and otherwise, the shielded wire has the least effect on the operation of the semiconductor device.
- a fixed potential is supplied.
- the shield wire supplies a fixed potential from the signal generator at the time of detection, so that it is possible to constantly monitor the shield wire and detect tampering.
- the detection operation is performed when the semiconductor device is activated and when the semiconductor device is in a standby state, but in other operations, the signal supplied to the shield line is set to a fixed potential of V ss.
- the same detection operation can be used to detect the disconnection / separation of the shield wire.
- the detection operation is performed when the semiconductor device is activated and in a standby state.
- the signal supplied to the shield line is set to a fixed potential of Vss or Vdd. It should be noted that in the detection operation using the coincidence Z mismatch judgment device, it is possible to constantly monitor the cutting and peeling of the shielded wire, and to use the fixed potential V ss and V dd at random after each transition from the standby state to the operation state. Furthermore, even if the semiconductor device malfunctions due to an unauthorized attack and the startup and the standby are successfully passed, the monitoring can be performed at all times, so that the tamper resistance can be improved.
- the non-volatile memory Stored as detection count information in Next, the semiconductor device is restarted, reset or returned from the fixed mode, and if no illegality is detected, the information in the non-volatile memory is erased. If the number of detections exceeds the specified number, the semiconductor device cannot be completely recovered.For example, important data to be protected is erased from the memory or the operation of the semiconductor device is disabled. However, it is more practical to execute the control in which restart cannot be performed.
- a protection circuit having a function of detecting tampering of a shield wire covering a semiconductor device and having a higher tamper resistance can be easily realized.
- the protection circuit can be held inside the semiconductor device. This makes it possible to protect confidential information from unauthorized analysis means and easily provide a more confidential semiconductor device.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Condensed Matter Physics & Semiconductors (AREA)
- Power Engineering (AREA)
- Semiconductor Integrated Circuits (AREA)
- Storage Device Security (AREA)
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04772754A EP1670059A4 (en) | 2003-08-28 | 2004-08-27 | SEMICONDUCTOR DEVICE PROTECTION CIRCUIT AND CORRESPONDING SEMICONDUCTOR DEVICE |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2003303823A JP4748929B2 (ja) | 2003-08-28 | 2003-08-28 | 保護回路および半導体装置 |
JP2003-303823 | 2003-08-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005022635A1 true WO2005022635A1 (ja) | 2005-03-10 |
Family
ID=34214010
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/012805 WO2005022635A1 (ja) | 2003-08-28 | 2004-08-27 | 半導体装置の保護回路およびこれを備えた半導体装置 |
Country Status (6)
Country | Link |
---|---|
US (2) | US7256599B2 (ja) |
EP (1) | EP1670059A4 (ja) |
JP (1) | JP4748929B2 (ja) |
CN (2) | CN100511681C (ja) |
TW (1) | TW200511502A (ja) |
WO (1) | WO2005022635A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8099783B2 (en) | 2005-05-06 | 2012-01-17 | Atmel Corporation | Security method for data protection |
US11877390B2 (en) | 2021-08-30 | 2024-01-16 | International Business Machines Corporation | Fabricating tamper-respondent sensors with random three-dimensional security patterns |
Families Citing this family (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006228910A (ja) * | 2005-02-16 | 2006-08-31 | Matsushita Electric Ind Co Ltd | 半導体装置 |
JP4749160B2 (ja) * | 2006-01-18 | 2011-08-17 | シャープ株式会社 | 集積回路 |
WO2007091210A2 (en) * | 2006-02-09 | 2007-08-16 | Nxp B.V. | Circuit arrangement, data processing device comprising such circuit arrangement as well as method for identifying an attack on such circuit arrangement |
US7535242B2 (en) * | 2006-05-03 | 2009-05-19 | Rambus Inc. | Interface test circuit |
DE102006027682B3 (de) * | 2006-06-14 | 2008-01-31 | Infineon Technologies Ag | Integrierte Schaltungsanordnung und Verfahren zum Betreiben einer integrierten Schaltungsanordnung |
KR100815177B1 (ko) | 2006-07-20 | 2008-03-19 | 주식회사 하이닉스반도체 | 반도체 장치 |
KR101299602B1 (ko) | 2007-03-27 | 2013-08-26 | 삼성전자주식회사 | 리버스 엔지니어링을 보호하는 집적회로 |
US9747472B2 (en) | 2007-09-13 | 2017-08-29 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Mesh grid protection |
JP5104869B2 (ja) * | 2007-09-19 | 2012-12-19 | 富士通株式会社 | 電源装置および電子機器 |
WO2009073231A1 (en) | 2007-12-06 | 2009-06-11 | Broadcom Corporation | Embedded package security tamper mesh |
FR2935078B1 (fr) * | 2008-08-12 | 2012-11-16 | Groupe Des Ecoles De Telecommunications Get Ecole Nationale Superieure Des Telecommunications Enst | Procede de protection du decryptage des fichiers de configuration de circuits logiques programmables et circuit mettant en oeuvre le procede |
EP2211289A1 (en) * | 2009-01-22 | 2010-07-28 | Robert Bosch GmbH | Method and control device for protecting a sensor against manipulation |
JP5460251B2 (ja) * | 2009-11-13 | 2014-04-02 | 株式会社日立製作所 | 情報処理装置 |
US20110255253A1 (en) * | 2010-04-17 | 2011-10-20 | Andrew Campbell | Protective serpentine track for card payment terminal |
JP2012053788A (ja) * | 2010-09-02 | 2012-03-15 | Canon Inc | 半導体集積回路装置 |
JP2012074674A (ja) * | 2010-09-02 | 2012-04-12 | Canon Inc | 半導体集積回路装置 |
JP5761947B2 (ja) | 2010-09-02 | 2015-08-12 | キヤノン株式会社 | 半導体集積回路装置 |
US8779787B2 (en) * | 2011-11-16 | 2014-07-15 | Arm Limited | Apparatus and method for determining variation in a predetermined physical property of a circuit |
US8776260B2 (en) | 2012-09-25 | 2014-07-08 | Broadcom Corporation | Mesh grid protection system |
CN202855734U (zh) * | 2012-10-23 | 2013-04-03 | 北京同方微电子有限公司 | 用于智能卡的有源防护装置 |
FR2998684B1 (fr) * | 2012-11-28 | 2014-11-21 | Soitec Solar Gmbh | Controle d'un dispositif traqueur solaire |
DE102013205729A1 (de) * | 2013-03-28 | 2014-10-02 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Vorrichtung und Verfahren mit einem Träger mit Schaltungsstrukturen |
CN105379174B (zh) * | 2013-07-16 | 2018-09-28 | 三菱电机株式会社 | 半导体装置 |
JP6340935B2 (ja) * | 2014-06-16 | 2018-06-13 | 大日本印刷株式会社 | Icチップ、異常検知処理方法、及びプログラム |
US10669668B2 (en) | 2017-11-28 | 2020-06-02 | Mark Goodson | Clothes dryer fire reduction system |
US10770410B2 (en) * | 2018-08-03 | 2020-09-08 | Arm Limited | Circuit alteration detection in integrated circuits |
US10839109B2 (en) * | 2018-11-14 | 2020-11-17 | Massachusetts Institute Of Technology | Integrated circuit (IC) portholes and related techniques |
CN112005249A (zh) * | 2019-03-05 | 2020-11-27 | 华为技术有限公司 | 一种用于裸片保护的电路、裸片及集成电路 |
DE102021111472A1 (de) | 2021-05-04 | 2022-11-10 | Markus Geiger | Manipulationssichere Vorrichtung zum Schutz eines elektronischen Speicherelements gegen Auslesen |
CN115513145B (zh) * | 2022-11-17 | 2023-03-10 | 灿芯半导体(上海)股份有限公司 | 一种防窥探,防篡改,低功耗屏蔽罩 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS58209136A (ja) * | 1982-05-31 | 1983-12-06 | Toshiba Corp | 自己試験機能を有する集積回路 |
JPH05167020A (ja) * | 1991-12-13 | 1993-07-02 | Nec Ibaraki Ltd | 半導体理論集積回路 |
JP2001141783A (ja) * | 1999-11-09 | 2001-05-25 | Canon Inc | 集積回路およびその評価方法 |
JP2001144255A (ja) * | 1999-11-12 | 2001-05-25 | Yamatake Corp | 集積回路装置および校正方法 |
JP2001166009A (ja) * | 1999-12-14 | 2001-06-22 | Matsushita Electric Ind Co Ltd | 診断機能を有する半導体集積回路 |
JP2001177064A (ja) * | 1999-12-17 | 2001-06-29 | Hitachi Ltd | 診断回路及び半導体集積回路 |
JP2001244414A (ja) * | 2000-02-29 | 2001-09-07 | Nippon Telegr & Teleph Corp <Ntt> | 半導体集積回路 |
JP2002529928A (ja) * | 1998-11-05 | 2002-09-10 | インフィネオン テクノロジース アクチエンゲゼルシャフト | Ic集積回路用保護回路 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3048429B2 (ja) | 1991-08-14 | 2000-06-05 | 株式会社東芝 | 半導体集積回路装置 |
US5389738A (en) * | 1992-05-04 | 1995-02-14 | Motorola, Inc. | Tamperproof arrangement for an integrated circuit device |
US5675645A (en) * | 1995-04-18 | 1997-10-07 | Ricoh Company, Ltd. | Method and apparatus for securing executable programs against copying |
FR2740553B1 (fr) * | 1995-10-26 | 1997-12-05 | Sgs Thomson Microelectronics | Procede de detection de presence de passivation dans un circuit integre |
US5796682A (en) * | 1995-10-30 | 1998-08-18 | Motorola, Inc. | Method for measuring time and structure therefor |
JP3037191B2 (ja) * | 1997-04-22 | 2000-04-24 | 日本電気アイシーマイコンシステム株式会社 | 半導体装置 |
DE10101330A1 (de) * | 2001-01-13 | 2002-07-18 | Philips Corp Intellectual Pty | Elektrische oder elektronische Schaltungsanordnung und Verfahren zum Schützen der selben von Manipulation und/oder Missbrauch |
US7065656B2 (en) * | 2001-07-03 | 2006-06-20 | Hewlett-Packard Development Company, L.P. | Tamper-evident/tamper-resistant electronic components |
US20040212017A1 (en) * | 2001-08-07 | 2004-10-28 | Hirotaka Mizuno | Semiconductor device and ic card |
JP2003296680A (ja) * | 2002-03-29 | 2003-10-17 | Hitachi Ltd | データ処理装置 |
US7005874B2 (en) * | 2004-06-28 | 2006-02-28 | International Business Machines Corporation | Utilizing clock shield as defect monitor |
-
2003
- 2003-08-28 JP JP2003303823A patent/JP4748929B2/ja not_active Expired - Fee Related
-
2004
- 2004-08-10 US US10/914,225 patent/US7256599B2/en active Active
- 2004-08-11 TW TW093124046A patent/TW200511502A/zh unknown
- 2004-08-27 EP EP04772754A patent/EP1670059A4/en not_active Withdrawn
- 2004-08-27 CN CN200480024221.7A patent/CN100511681C/zh not_active Expired - Fee Related
- 2004-08-27 CN CN200810134167.1A patent/CN101330074B/zh not_active Expired - Fee Related
- 2004-08-27 WO PCT/JP2004/012805 patent/WO2005022635A1/ja active Application Filing
-
2007
- 2007-07-17 US US11/826,583 patent/US7345497B2/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS58209136A (ja) * | 1982-05-31 | 1983-12-06 | Toshiba Corp | 自己試験機能を有する集積回路 |
JPH05167020A (ja) * | 1991-12-13 | 1993-07-02 | Nec Ibaraki Ltd | 半導体理論集積回路 |
JP2002529928A (ja) * | 1998-11-05 | 2002-09-10 | インフィネオン テクノロジース アクチエンゲゼルシャフト | Ic集積回路用保護回路 |
JP2001141783A (ja) * | 1999-11-09 | 2001-05-25 | Canon Inc | 集積回路およびその評価方法 |
JP2001144255A (ja) * | 1999-11-12 | 2001-05-25 | Yamatake Corp | 集積回路装置および校正方法 |
JP2001166009A (ja) * | 1999-12-14 | 2001-06-22 | Matsushita Electric Ind Co Ltd | 診断機能を有する半導体集積回路 |
JP2001177064A (ja) * | 1999-12-17 | 2001-06-29 | Hitachi Ltd | 診断回路及び半導体集積回路 |
JP2001244414A (ja) * | 2000-02-29 | 2001-09-07 | Nippon Telegr & Teleph Corp <Ntt> | 半導体集積回路 |
Non-Patent Citations (1)
Title |
---|
See also references of EP1670059A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8099783B2 (en) | 2005-05-06 | 2012-01-17 | Atmel Corporation | Security method for data protection |
US11877390B2 (en) | 2021-08-30 | 2024-01-16 | International Business Machines Corporation | Fabricating tamper-respondent sensors with random three-dimensional security patterns |
Also Published As
Publication number | Publication date |
---|---|
CN100511681C (zh) | 2009-07-08 |
EP1670059A1 (en) | 2006-06-14 |
CN101330074B (zh) | 2010-09-01 |
TW200511502A (en) | 2005-03-16 |
US20070257683A1 (en) | 2007-11-08 |
JP4748929B2 (ja) | 2011-08-17 |
EP1670059A4 (en) | 2010-06-09 |
US7256599B2 (en) | 2007-08-14 |
CN1839475A (zh) | 2006-09-27 |
US7345497B2 (en) | 2008-03-18 |
US20050047047A1 (en) | 2005-03-03 |
JP2005072514A (ja) | 2005-03-17 |
CN101330074A (zh) | 2008-12-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4748929B2 (ja) | 保護回路および半導体装置 | |
WO2011155114A1 (ja) | 保護回路と半導体装置及び電子機器 | |
KR100508891B1 (ko) | 집적 회로에 대한 어택을 검출하기 위한 회로 장치 및 방법 | |
US9523736B2 (en) | Detection of fault injection attacks using high-fanout networks | |
JP2002529928A (ja) | Ic集積回路用保護回路 | |
US9455233B1 (en) | System for preventing tampering with integrated circuit | |
US20150192637A1 (en) | Use of a (Digital) PUF for Implementing Physical Degradation/Tamper Recognition for a Digital IC | |
TWI681281B (zh) | 主動式特定用途積體電路入侵防護罩 | |
US9003559B2 (en) | Continuity check monitoring for microchip exploitation detection | |
KR20100053501A (ko) | 집적 회로 보호 및 검출 그리드 | |
US11480614B2 (en) | Side-channel signature based PCB authentication using JTAG architecture and a challenge-response mechanism | |
CN107944309A (zh) | 一种抗物理攻击的屏蔽检测电路 | |
US10770410B2 (en) | Circuit alteration detection in integrated circuits | |
JP4462903B2 (ja) | 半導体ウェハ | |
Paul et al. | SILVerIn: Systematic integrity verification of printed circuit board using JTAG infrastructure | |
US9959393B2 (en) | Method for testing tamper protection of a field device and field device having tamper protection | |
JP2006303480A (ja) | 半導体装置及びその保護方法 | |
Guo et al. | MPA: Model-assisted PCB attestation via board-level RO and temperature compensation | |
EP3291127B1 (en) | Active tamper detection circuit with bypass detection and method therefor | |
US4726026A (en) | Fault-tolerant voted output system | |
JP2008293144A (ja) | 半導体集積回路及びicカード | |
US9506981B2 (en) | Integrated circuit with distributed clock tampering detectors | |
CN113689635B (zh) | 一种防止误触发的防拆电路结构及方法 | |
US20230401342A1 (en) | Electronic tampering detection | |
JP2010062635A (ja) | 暗号処理装置および集積回路 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200480024221.7 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004772754 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2004772754 Country of ref document: EP |