This paper describes an integrated circuit (IC) authentication and tamper detection system, based on a Film Bulk Acoustic Resonator (FBAR) and passive Radio-Frequency Identification (RFID), which allows for wireless detection of tampering or counterfeiting in packaged ICs. We demonstrate the concept through the use of a 2.6 GHz FBAR based on a Zinc Oxide (ZnO) thin film. The FBAR is series connected to a piezoelectric energy harvester, which can generate voltage pulses with a peak amplitude of 56 V when tampering activity is detected. Our measurements validate this concept and demonstrate that we can permanently alter the high frequency resonance characteristics of the FBAR through dielectric breakdown caused by tampering.
more »
« less
Tamper-sensitive pre-formed ReRAM-based PUFs: Methods and experimental validation
In this paper, we present the characterization of pre-formed resistive random access memories to design physical unclonable functions and experimentally validate inherent properties such as tamper sensitivity and a self-destroy mode. The physical unclonable functions were tested for repetitive use, temperature effects, and aging. The variations during successive response generation cycles and drift rates are quantized to explore their reliability. We define tamper-sensitivity as the ability to detect tampering attacks. To establish tamper sensitivity, the cells were characterized for higher current sweeps, and the injected current at which they break down is extracted and analyzed to determine suitable operating ranges. Our experimental results show that at least 91% of the cells can generate keys protected by the scheme, while 22% of the sensing elements are triggered. Finally, the cells were characterized for high Voltage sweeps to be able to destroy the physical unclonable functions on-demand when tampering activity is detected. A fixed Voltage of 1.9 V is enough to destroy the entire array.
more »
« less
- Award ID(s):
- 2204502
- PAR ID:
- 10451132
- Date Published:
- Journal Name:
- Frontiers in Nanotechnology
- Volume:
- 4
- ISSN:
- 2673-3013
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Physical attacks can compromise the security of cryptographic devices. Depending on the attack’s requirements, adversaries might need to (i) place probes in the proximity of the integrated circuits (ICs) package, (ii) create physical connections between their probes/wires and the system’s PCB, or (iii) physically tamper with the PCB’s components, chip’s package, or substitute the entire PCB to prepare the device for the attack. While tamper-proof enclosures prevent and detect physical access to the system, their high manufacturing cost and incompatibility with legacy systems make them unattractive for many low-cost scenarios. In this paper, inspired by methods known from the field of power integrity analysis, we demonstrate how the impedance characterization of the system’s power distribution network (PDN) using on-chip circuit-based network analyzers can detect various classes of tamper events. We explain how these embedded network analyzers, without any modifications to the system, can be deployed on FPGAs to extract the frequency response of the PDN. The analysis of these frequency responses reveals different classes of tamper events from board to chip level. To validate our claims, we run an embedded network analyzer on FPGAs of a family of commercial development kits and perform extensive measurements for various classes of PCB and IC package tampering required for conducting different side-channel or fault attacks. Using the Wasserstein Distance as a statistical metric, we further show that we can confidently detect tamper events. Our results, interestingly, show that even environment-level tampering activities, such as the proximity of contactless EM probes to the IC package or slightly polished IC package, can be detected using on-chip impedance sensing.more » « less
-
The security of printed circuit boards (PCBs) has become increasingly vital as supply chain vulnerabilities, including tampering, present significant risks to electronic systems. While detecting tampering on a PCB is the first step for verification, forensics is also needed to identify the modified component. One non-invasive and reliable PCB tamper detection technique with global coverage is the impedance characterization of PCB's power delivery network (PDN). However, it is an open question whether one can use the two-dimensional impedance signatures for forensics purposes. In this work, we introduce a novel PCB forensics approach, using explainable AI (XAI) on impedance signatures. Through extensive experiments, we replicate various PCB tamper events, generating a dataset used to develop an XAI algorithm capable of not only detecting tampering but also explaining why the algorithm makes a decision about whether a tamper event has happened. At the core of our XAI algorithm is a random forest classifier with an accuracy of 96.7%, sufficient to explain the algorithm's decisions. To understand the behavior of the classifier In the decision-making process, we utilized the SHAP values as an XAI tool to determine which frequency component influences the classifier's decision for a particular class the most. This approach enhances detection capabilities as well as advancing the verifier's ability to reverse-engineer and analyze two-dimensional impedance signatures for forensics.more » « less
-
Stealthy chip-level tamper attacks, such as hardware Trojan insertions or security-critical circuit modifications, can threaten modern microelectronic systems’ security. While traditional inspection and side-channel methods offer potential for tamper detection, they may not reliably detect all forms of attacks and often face practical limitations in terms of scalability, accuracy, or applicability. This work introduces a non-invasive, contactless tamper detection method employing a complementary split-ring resonator (CSRR). CSRRs, which are typically deployed for non-destructive material characterization, can be placed on the surface of the chip’s package to detect subtle variations in the impedance of the chip’s power delivery network (PDN) caused by tampering. The changes in the PDN’s impedance profile perturb the local electric near field and consequently affect the sensor’s impedance. These changes manifest as measurable variations in the sensor’s scattering parameters. By monitoring these variations, our approach enables robust and cost-effective physical integrity verification requiring neither physical contact with the chips or printed circuit board (PCB) nor activation of the underlying malicious circuits. To validate our claims, we demonstrate the detection of various chip-level tamper events on an FPGA manufactured with 28 nm technology.more » « less
-
Abstract Counterfeit products pose significant economic, security, and health risks. One approach to mitigate these risks involves establishing product provenance by tracing them back to their manufacturing origins. However, current identification methods, such as barcodes and RFIDs, have limitations that make them vulnerable to counterfeiting. Similarly, nonvolatile memories, physically unclonable functions, and emerging techniques like Diamond Unclonable Security Tag and DNA fingerprinting also have their own limitations and challenges. For a traceability solution to gain widespread adoption, it must meet certain criteria, including being inexpensive, unique, immutable, easily readable, standardized, and unclonable. In this paper, we propose a solution that utilizes ultrashort pulsed lasers to create unique, unclonable, and immutable physical tags. These tags can then be read nondestructively using far-field Terahertz (THz) spectroscopy. The primary objective of this paper is to investigate the feasibility of our proposed approach. We aim to assess the ability to distinguish laser marks with varying depths, evaluate the sensitivity of THz reading to laser engraving parameters, examine the capacity to capture high-information-density marks, and explore the ability to capture subsurface tags. By addressing these aspects, our method holds the potential to serve as a universal solution for a wide range of traceability applications.more » « less
An official website of the United States government

