Robust Secure Shield Architecture for Detection and Protection against Invasive Attacks

Young Woo Lee, Hyeonchan Lim, Youngkwang Lee, Sungho Kang

Research output: Contribution to journalArticlepeer-review

10 Citations (Scopus)


Invasive attacks, such as microprobing or focused-ion-beam (FIB) circuit editing are serious threats to security-related semiconductors. To ensure that there is security against invasive attacks, an effective countermeasure is to use a protective layer as a secure shield. Previous secure shield methods can be classified into one of two categories; detection circuits based on the delay difference or block ciphers. For the former, timing asymmetries caused by the capacitance of the probe are detected. The main drawback of this method is that it is highly vulnerable to chip editing by FIB equipment. FIB circuit editing can easily cripple the detection circuits of the secure shield. In contrast, the cryptographically secure shield based on the block cipher can provide strong protection against FIB circuit editing. However, it is prone to microprobing attacks because of its inability to detect the capacitance load of the probe. In this article, we propose a robust secure shield architecture against invasive attacks, including both probe attempts and the FIB circuit editing. The proposed method is based on the detection circuits with low hardware overhead and fast-analysis time and includes protection circuits to prevent information from being leaked.

Original languageEnglish
Article number8852733
Pages (from-to)3023-3034
Number of pages12
JournalIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Issue number10
Publication statusPublished - 2020 Oct

Bibliographical note

Publisher Copyright:
© 1982-2012 IEEE.

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering


Dive into the research topics of 'Robust Secure Shield Architecture for Detection and Protection against Invasive Attacks'. Together they form a unique fingerprint.

Cite this