HARDWARE TROJAN SCANNER

A method of detecting hardware Trojans in an IC includes providing a golden IC layout data set or SEM image data taken at long dwelling time on an active area of the golden IC after polishing it from the backside. Next, the IC under authentication (IUA) sample is prepared for fast SEM imagining (sho...

Full description

Saved in:
Bibliographic Details
Main Authors Tehranipoor, Mark M, Woodard, Damon, Vashistha, Nidish, Rahman, Mir Tanjidur, Asadizanjani, Navid, Shen, Haoting
Format Patent
LanguageEnglish
Published 19.03.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A method of detecting hardware Trojans in an IC includes providing a golden IC layout data set or SEM image data taken at long dwelling time on an active area of the golden IC after polishing it from the backside. Next, the IC under authentication (IUA) sample is prepared for fast SEM imagining (shorter dwelling time) after backside thinning. Next step is to perform image processing on the IUA's SEM image, which includes histogram equalization with noise filtering using Gaussian and Median filters. In the last step, the IUA sample data with the shorter dwelling time is compared with the golden IC layout data or the golden image data from high quality (longer dwelling time) SEM scanning process. At the end the result of the comparison is used to identify hardware Trojans.
Bibliography:Application Number: US201916573922