Embodiments of the present invention generally relate to a chip package, and in particular, to chip package having a selective glass shield to prevent tamper.
Integrated circuits (ICs) often include sensitive information that may be interesting to hackers. A known technique used by hackers to gain access to information residing in an IC is micro-probing. Micro-probing involves forming an electrical contact with the IC by dropping a probe needle directly on the point of interest of the IC, or on an area of the IC to which the point of interest is connected. The probe needles are held by a micro-manipulator that is controlled by the hacker to precisely land the probe needle on the IC. The needle injects a voltage pulse that couples with the chip structure. Fault injection is another technique used to conduct a physical attach against integrated circuits. For example, fault injection may use electromagnetic pulses to inject errors into the integrated circuit to gain access or to bypass security features.
Probing the backside of a die has been used to attack ICs. This may occur with a flip chip package because the back side of the die is completely exposed. Often, all that is required is removal of the heat sink mounted on the flip chip package. The exposed back side of the die thus allows voltage to be injected into the power structure of the chip package by applying bias to the bulk silicon. Another potential point of attack is the interconnect between dies for a multi-die package because the interconnect location is fully known.
There is a need, therefore, for a chip package having a selective silicon glass shield and/or a detection module for preventing tampering.
In some embodiments, a chip package includes a package substrate and an integrated circuit (IC) die disposed on the package substrate. The IC dies includes a security asset. The chip package also includes a glass based shield selectively disposed on the IC die and above the security asset. The glass based shield is configured to block access to the security asset.
In some embodiments, the chip package includes an oxide layer disposed between the glass based shield and the IC die.
In some embodiments, the chip package includes a detection module and a wire connecting the detection module to the glass based shield. The detection module is configured to generate and send a serial bit stream to the glass based shield. The detection module is also configured to monitor for changes in the serial bit stream returning from the glass based shield. Changes detected in the serial bit stream indicates the glass based shield has been tampered.
In another example, a chip package includes a package substrate and an integrated circuit (IC) die disposed on the package substrate. A security asset is disposed in the IC die and includes a detection module for generating a serial bit stream. A glass based shield is selectively disposed on the IC die and above the security asset. The glass based shield prevents access to the security asset. The chip package also includes a wire for transmitting the serial bit stream to the glass based shield and a comparator for determining a change in the serial bit stream.
In another example, a method of preventing tampering of a chip package includes disposing a glass based shield on an integrated circuit (“IC”) die of the chip package. The chip package has a detection module and an active wire connected to the detection module. The method also includes coupling the active wire to the glass based shield. The active wire has a wire mesh disposed in the glass based shield. The method further includes sending an outgoing serial bit stream from the detection module to the wire mesh in the glass based shield. The detection module receives a return serial bit stream from the wire mesh. The outgoing serial bit stream is compared to the return serial bit stream. A tampering event is indicated if the return serial bit stream is different from the outgoing serial bit stream.
So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures. It is contemplated that elements of one embodiment may be beneficially incorporated in other embodiments.
In some embodiments, a chip package is provided with a glass based shield selectively disposed on an integrated circuit (IC) die at a location above a security asset in the IC die. The glass based shield advantageously prevents access to the security asset via the IC die. The chip package may optionally include an oxide layer disposed between the glass base shield and the IC die. The oxide layer acts as an insulator against electrical tampering of the IC die. In some embodiments, the chip package includes an active shield having a detection module and a wire connecting the detection module to the glass based shield. The detection module is configured to generate and send a serial bit stream to the glass based shield. The detection module is also configured to monitor for changes in the serial bit stream returning from the glass based shield. Changes detected in the serial bit stream indicates the glass based shield has been tampered.
Turning now to
The chip package 101 includes at least two IC dies 114 mounted to a package substrate 122. Although two IC dies 114 are shown in the example depicted in
The package substrate 122 includes circuitry for electrically connecting the IC dies 114 to circuitry of the package substrate 122. Solder connections 120, also known as or “micro bumps,” are utilized to provide mechanical and electrical connections between the circuitry of the IC dies 114 and the circuitry of the package substrate 122. The solder connections 120, when in the form of solder joints, may be fabricated from tin-lead solder, lead-free solder, solder on copper pillar, or other suitable solder. In the example depicted in
Solder connections 118, also known as or “solder balls,” are utilized to provide mechanical and electrical connections between the circuitry of the PCB 103 and the circuitry of the package substrate 122. Alternatively, the package substrate 122 may be coupled to the PCB 103 by a Pin Grid Array (PGA) or other suitable technique. In the example depicted in
As discuss above, the IC dies 114 is mounted to the top surface 102 the package substrate 122. The IC dies 114 may be programmable logic devices, such as field programmable gate arrays (FPGA), memory devices, optical devices, processors or other IC logic structures. Optical devices include photo-detectors, lasers, optical sources, and the like. Optionally, an interposer may be disposed between the IC dies 114 and the package substrate 122. In one embodiment, at least one of the dies 144 include a security asset such as Root of Trust and other sensitive information in the chip package 101.
In some embodiments, the chip package 101 includes a passive shield disposed on top of the dies 114. In one embodiment, the passive shield is an insulation layer. An exemplary insulation layer is an oxide layer 211. The oxide layer 211 may act as an electrical insulator to protect against external attacks.
In one example, the oxide layer 211 may be formed by attaching a carrier silicon 215 on the dies 114 using oxide fusion bonding. The thickness of the oxide layer 211 may be determined based on the protection required. A thicker oxide layer 211 may protect against a higher voltage. In some examples, the oxide layer 211 may be from 0.1 μm to 0.8 μm or from 1 μm to 0.5 μm. In addition to shielding the dies 144, the oxide layer 211 may extend across the gap 126 between the dies 114, thereby shielding the gap 126.
In another embodiment, the chip package 101 includes one or more glass based shields 220 as the passive shields, as shown in
In some embodiments, a second glass based shield 222 is disposed above the gap 126 between two dies 114. In this example, the second glass based shield 222 at least partially overlaps both dies 114. The second glass based shield 222 blocks access to the gap 126, thereby preventing attacks on the interconnect wires between the dies 114. It is contemplated the second glass based shield 222 may be extend to protect interfaces between any suitable number of dies in a chip package. As shown, the second glass based shield 222 is disposed above the oxide layer 211. However, it is contemplated inclusion of the oxide layer 211 below the second glass based shield 222 is optional.
In some embodiments, one or more optional silicon carriers 230 may be disposed in the space between the glass based shields 221, 222 and on the dies 114. The silicon carriers 230 may help even out the contour above the dies 114. In some embodiment, a heat sink (not shown) may be disposed above the glass based shields 221, 222, with or without the silicon carriers 230.
In this example, an optional second oxide layer 212 is disposed above the glass based shields 221, 222 and the silicon carriers 230. In some embodiments, a heat sink (not shown) may be disposed above the second oxide layer 212. In another embodiment, a silicon carrier (not shown) is disposed above the second oxide layer 212.
In another embodiment, the chip package 101 includes an active shield system 250 for monitoring tampering of the first glass based shield 221, as shown in
In one embodiment, the active wire 320 includes a first wire portion 321 and a second wire portion 322, and a wire mesh 315. The first wire portion 321 is connected to the output terminal 311, and the second wire portion 322 is connected to the input terminal 312 of the detection module 310. In some embodiments, the input terminal 312 and the output terminal 311 are pads 365 in the IC die 114. The active wire 320 forms a wire mesh 315 inside the first glass based shield 221. The wire mesh 315 protects the first glass based shield 221 from tampering, such as by a probe. In one embodiment, the wire mesh 315 is configured such that a probe attempting to penetrate the first glass based shield 221 will contact the wire mesh 315. Contact of the probe with the wire mesh 315 alters a bit stream transmitted through the active wire 320, and the altered bit stream is detectable by the detection module 310. The detection module 310 may be powered by any suitable power source 307 such as a coin cell or a super capacitor.
The detection module 310 generates a first serial bit stream to the output terminal 311. In one embodiment, the detection module 310 includes a physically unclonable function (PUF) 330 that feeds a linear feedback shift register (LFSR) 340, which generates the first serial bit stream. The first serial bit stream is transmitted through the output terminal 311 to the first end of the first wire portion 321. The first wire portion 321 sends the first serial bit stream across the first glass based shield 221. The first serial bit stream is transmitted from the first wire portion 321 to the wire mesh 315 and then to the second wire portion 322. In turn, the first serial bit stream is transmitted to the input terminal 312 of the detection module 310. In some embodiments, the first serial bit stream passes through an optional signal conditioner 342 before arriving at the comparator 345. The first serial bit stream is also sent to a delay 355 before reaching the comparator 345. One advantage of using the PUF is that the LFSR will be unique to each device. In this respect, an attack is not repeatable on another device if one of the devices is compromised.
The comparator 345 compares the first serial bit stream from the delay 355 with the first serial bit stream returning from the input terminal 312. When both first serial bit streams are identical, it's an indication the first serial bit stream was not altered as it passes through the first glass based shield 221. However, when a difference between the first serial bit streams is found upon comparison, it's an indication that the first serial bit stream was altered, such as by contact with the probe needle or other tampering. In response, the detection module 310 generates a tampering signal to indicate a security violation of the glass based shield 221. Additionally, when the wire mesh 315 is broken or manipulated, an attacker would have only one clock cycle to inject the tampering bit stream. The short time cycle increases the difficulty of injecting the tampering bit stream. Thus, the active shield system 350 allows monitoring against tampering and prevents tampering of the glass based shield 221.
In another embodiment, the active shield system 350 may include first and second active wires 361, 362 for protecting the glass based shield 221, as shown in
The first active wire 361 transmits a first serial bit stream to the glass based shield 221, and the second active wire 362 transmits a second serial bit stream to the glass based shield 221. A comparator 345 compares the first and second serial bit streams outputted to the glass based shield 221 to the first and second serial bit streams inputted to the detection module 310, respectively. When the outputted first and second serial bit streams are identical to the inputted first and second serial bit streams, it's an indication the first and second serial bit streams were not altered as they pass through the first glass based shield 221. However, when a difference is found in at least one of the first and second serial bit streams upon comparison, it's an indication that at least one of the first and second serial bit streams was altered, such as by contact with the probe needle or other tampering. In response, the detection module 310 generates a tampering signal to indicate a security violation of the glass based shield 221. In one embodiment, the second active wire 362 is arranged to run inverted to the first active wire 361. In this respect, when a probe needle having a diameter bigger than distance between the two active wires 361, 362 touch one of the wires 361, 362, a short will be created, thereby generating a tamper signal.
Turning now to
The method 400 begins at operation 410 by disposing a glass based shield 221 on an integrated circuit (“IC”) die 114 of the chip package 100. The IC die 114 may be disposed on a package substrate 122 of the chip package 100. In one example, the glass based shield 221 is selectively disposed at locations where protection from tampering is needed. For example, the glass based shield 221 is disposed above the IC die 114 containing the security asset 109 to prevent backside attacks. In another example, the glass based shield 221 is at least partially disposed on top two adjacent IC dies 114. In one embodiment, the IC die 114 includes an active shield system 250 having a detection module 310 and an active wire 320 connected to the detection module 310.
At operation 420, the active wire 320 is coupled to the glass based shield 221. The active wire 320 includes a wire mesh 315 disposed in the glass based shield 221.
At operation 430, an outgoing serial bit stream is sent from the detection module 310 to the wire mesh 315 in the glass based shield 221. In one embodiment, the detection module 310 includes a physically unclonable function (PUF) 330 that feeds a linear feedback shift register (LFSR) 340, which generates the outgoing serial bit stream.
At operation 440, the detection module 310 receives a return serial bit stream from the wire mesh 315.
At operation 450, the outgoing serial bit stream is compared to the return serial bit stream. In one example, the comparator 345 is used to compare the outgoing serial bit stream to the return serial bit stream. When the outgoing serial bit stream is identical to the return serial bit stream, it's an indication the outgoing serial bit stream was not altered as it passes through the first glass based shield 221.
At operation 460, when the return serial bit stream is different than the outgoing serial bit stream, it's an indication that the outgoing serial bit stream was altered, such as by contact with the probe needle or other tampering. In response, the detection module 310 generates a tampering signal to indicate a tampering event has occurred with respect to the glass based shield 221.
In some embodiments, a chip package is provided with a passive shield for preventing tampering of a security asset in an IC die. In one embodiment, a glass based shield is selectively disposed on an integrated circuit (IC) die at a location above a security asset in the IC die. The glass based shield advantageously prevents access to the security asset via the IC die. In another embodiment, the passive shield includes an oxide layer disposed between the glass base shield and the IC die. The oxide layer acts as an insulator against electrical tampering of the IC die. The oxide layer may be used independently or in combination with the glass based shield.
In some embodiments, the chip package includes an active shield having a detection module and a wire connecting the detection module to the glass based shield. The detection module is configured to generate and send a serial bit stream to the glass based shield. The detection module is also configured to monitor for changes in the serial bit stream returning from the glass based shield. Changes detected in the serial bit stream indicates the glass based shield has been tampered. It is contemplated the active shield may be used independently or in combination with the passive shield.
In some embodiments, a chip package includes a package substrate and an integrated circuit (IC) die disposed on the package substrate. The IC dies includes a security asset. The chip package also includes a glass based shield selectively disposed on the IC die and above the security asset. The glass based shield is configured to block access to the security asset.
In some embodiments, the chip package includes an oxide layer disposed between the glass based shield and the IC die.
In some embodiments, the chip package includes a detection module and a wire connecting the detection module to the glass based shield. The detection module is configured to generate and send a serial bit stream to the glass based shield. The detection module is also configured to monitor for changes in the serial bit stream returning from the glass based shield. Changes detected in the serial bit stream indicates the glass based shield has been tampered.
In another example, a chip package includes a package substrate and an integrated circuit (IC) die disposed on the package substrate. A security asset is disposed in the IC die and includes a detection module for generating a serial bit stream. A glass based shield is selectively disposed on the IC die and above the security asset. The glass based shield prevents access to the security asset. The chip package also includes a wire for transmitting the serial bit stream to the glass based shield and a comparator for determining a change in the serial bit stream.
In another example, a method of preventing tampering of a chip package includes disposing a glass based shield on an integrated circuit (“IC”) die of the chip package. The chip package has a detection module and an active wire connected to the detection module. The method also includes coupling the active wire to the glass based shield. The active wire has a wire mesh disposed in the glass based shield. The method further includes sending an outgoing serial bit stream from the detection module to the wire mesh in the glass based shield. The detection module receives a return serial bit stream from the wire mesh. The outgoing serial bit stream is compared to the return serial bit stream. A tampering event is indicated if the return serial bit stream is different from the outgoing serial bit stream.
While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.