Award Abstract # 1812600
SaTC: STARSS: Small: Analysis of Security and Countermeasures for Split Manufacturing of Integrated Circuits

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF WISCONSIN SYSTEM
Initial Amendment Date: July 20, 2018
Latest Amendment Date: July 20, 2018
Award Number: 1812600
Award Instrument: Standard Grant
Program Manager: Karen Karavanic
kkaravan@nsf.gov
 (703)292-2594
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: August 1, 2018
End Date: July 31, 2023 (Estimated)
Total Intended Award Amount: $312,210.00
Total Awarded Amount to Date: $312,210.00
Funds Obligated to Date: FY 2018 = $312,210.00
History of Investigator:
  • Azadeh Davoodi (Principal Investigator)
    adavoodi@wisc.edu
Recipient Sponsored Research Office: University of Wisconsin-Madison
21 N PARK ST STE 6301
MADISON
WI  US  53715-1218
(608)262-3822
Sponsor Congressional District: 02
Primary Place of Performance: University of Wisconsin
21 North Park Street Suite 6401
Madison
WI  US  53715-1218
Primary Place of Performance
Congressional District:
02
Unique Entity Identifier (UEI): LCLSJAGTNZQ7
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001819DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 021Z, 025Z, 7434, 7923, 9102
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Integrated circuit fabrication has spread across the globe, with over 90% of the world's fabrication capacity controlled by non-US companies. This project is on studying the security of chip fabrication by an untrusted foundry. The fabrication technique, known as split manufacturing, is based on partial sharing of the chip design information with the untrusted foundry in order to protect the intellectual property of the chip. With this technique, only a challenging portion of the chip is manufactured at the untrusted foundry. The remaining is completed by a trusted and smaller-scale foundry.

Specific research tasks include: (a) use of machine learning techniques to decide an appropriate "split level" to divide the chip design files into trusted and untrusted portions; (b) developing design-aid tools to obfuscate the chip layout files in order to make reverse engineering by the untrusted foundry infeasible; (c) development and public release of a software tool to generate various split-manufactured instances from the design files of the full chip, in order to promote research in this area.

Besides the release of the software tool, research findings will be published across communities related to the fields of hardware security and Integrated Circuit design. Specific components of the project are designed to promote involvement of undergraduate students in research. Involvement of women and underrepresented students in research will be pursued at all levels.

Data and software tools will be publicly accessible from http://homepages.cae.wisc.edu/~adavoodi/split-man.htm and will remain active for at least two years following the end date of the award.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Zeng, Wei and Davoodi, Azadeh and Topaloglu, Rasit Onur "Lorax: Machine Learning-Based Oracle Reconstruction With Minimal I/O Patterns" 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) , 2021 https://doi.org/10.1109/ISVLSI51109.2021.00033 Citation Details
Zeng, Wei and Davoodi, Azadeh and Topaloglu, Rasit Onur "ObfusX: Routing obfuscation with explanatory analysis of a machine learning attack" Integration , v.89 , 2023 https://doi.org/10.1016/j.vlsi.2022.10.013 Citation Details
Zeng, Wei and Davoodi, Azadeh and Topaloglu, Rasit Onur "ObfusX: Routing Obfuscation with Explanatory Analysis of a Machine Learning Attack" 2021 26th Asia and South Pacific Design Automation Conference (ASP-DAC) , 2021 Citation Details

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

Manufacturing outsourcing of Integrated Circuits has become more common than ever before because of the high cost of fabricating high-end chips. As a result, security issues including design piracy and hardware Trojans injection may arise when an untrusted foundry is involved in manufacturing. To alleviate these problems, split manufacturing has been proposed as a technique where the untrusted foundry only receives and fabricates a partial layout up to a metal layer denoted by a “split level”. This portion of the layout is referred to as the public portion. The remainder of the design includes the private layers and will be fabricated at a secondary stage by a trusted foundry. 

This project first developed a machine learning (ML) attack model to show that an attacker may still guess the connectivity implied by the private layers using only the public layers. The ML attack model was shown to be significantly more effective compared to other existing attack models for this problem.

Next, this research developed a novel way to build a IC layout obfuscator for split manufacturing, based on recent advancements in the area of ``explainability'' of machine learning. The PIs adopted an explanatory metric, namely the SHapley Additive exPlanation (SHAP), to analyze the ML attack model developed earlier. The SHAP-based analysis reveals to what extent each layout feature contributes to correctly predicting each individual unknown connection as seen by an untrusted foundry. Next, this information is exploited to design a SHAP-guided obfuscator against the ML attack model where only truly vulnerable connections are identified and each is obfuscated by just the necessary amount, in order to minimize perturbations to the original design.

The source codes of the attack model and layout obfuscator were released on the "CAD for Assurance" repository for free download.  The NSF award allowed partial support of two PhD students including one female student. Some of the conference and journal publications related to this award included collaborator from IBM as co-author.


Last Modified: 12/13/2023
Modified by: Azadeh Davoodi

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page