This invention generally relates to the security of integrated circuit devices and specifically to physical security of integrated circuit devices.
Certain types of devices are targets for sophisticated attacks. For example, chips storing cryptographic keys or other secure data or chips performing secure transactions (e.g., credit card transactions) are particularly attractive to attackers. One style of physical attacks, referred to as an enclosure attack, involves penetrating the device enclosure to physically access the device. In these physical attacks, the package is opened and any encapsulating material is removed or etched away. The attacker then accesses the internals of the chip or device using a probe. The attacker can then observe and/or manipulate the internal chip signals.
What is therefore needed is package level security combining logical protection, embedded physical security measures, and active tamper detection for critical data and signals.
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention. In the drawings:
The present invention will now be described with reference to the accompanying drawings. In the drawings, like reference numbers may indicate identical or functionally similar elements
1.0 Overview
Critical components of a chip or device may be attacked from the top, sides, or bottom of its package. Conventional techniques to protect against these physical attacks, particularly those that do not provide logical protection of critical signals, construct a box around one or more chips.
Embodiments of the present invention described herein provide protection against attacks from the top, bottom, and/or side of the package. The bond wire protection embodiments described in Section 2 provide protection against and detection of attacks from the side of a package. The top protection embodiments (e.g., the stacked die and package-on-package) embodiments described in Section 4 below provide protection against and detection of attacks to the top of the package. The package-on-package embodiments described in Section 4 also provide physical protection against side attacks. Protection from bottom attacks may be provided via a board level mesh located in the substrate onto which the die is attached. A board level mesh may be provided using normal manufacturing techniques.
2.0 Bond Wire Protection
Package 200 includes one or more integrated circuit (IC) dies 202 mounted on a substrate 204. In an embodiment, die 202 is an integrated security processor having an embedded system on chip processor and multiple peripheral devices. For example, the die may include sensitive input/output devices such as a magnetic strip reader, smartcard input/output, credit card reader, secure keypad, and/or touch screen. In an embodiment, the package substrate is a multi-layer board (e.g., 4-layer) and is used to route wire bonded signals to package balls 206.
In an embodiment, package 200 uses staggered pads in the I/O pad ring of the device. Pads for sensitive (or protected) signals (also referred to as “signal pads”) are placed on stagger-out pads (not shown). Stagger-out pads are on the farthest edge of the die. The protective bond mesh is implemented on stagger-in pads adjacent to the stagger-out pads. Stagger-in pads (not shown) are located behind the stagger-out bond pads and stagger-out (or “signal”) bond wires 250. The stagger-in bond wires (also referred to as “protection bond wires”) 240 are shaped so that they are vertically higher than the stagger-out bond wires. The protection bond wires therefore provide both vertical and horizontal protection of the stagger-out (sensitive signal) pads and bond wires 250. These sensitive signals are routed into the substrate before leaving the protective cage created by the protection wire bonds. As illustrated in
The stagger-in protective pads (not shown) are constructed using a wire pad. The wire pad has no connection to the substrate or power planes of adjacent pads. The protective pads are only connected to isolated metal and isolated vias on the die. In an embodiment, the protection bond wires 240 are connected to form one or more protection circuits. A tamper signal is driven through each protection circuit to a detection circuit. For additional security, the driving pad(s) of the protection circuit may be driven from a protected security area of die 202 (such as described in Section 3.0 below). The detection circuit may be configured to detect a cut or short in the protection circuit. A detection circuit may also be configured to detect changes to other characteristics of the protection circuit such as capacitance or resistance changes.
Signals that leave the chip (via signal bond wires 250) may be logically protected using encryption and authentication techniques. Package 200 may also include integrated physical protection including frequency monitoring, voltage monitoring, temperature sensors, and a sensor mesh which protects the chip in certain sensitive areas.
As would be appreciated by persons of skill in the art, solder balls 206 are arranged in a pattern having a plurality of rows. In embodiments, security sensitive signals are placed at least two rows deep from the outside of the ball array. Less sensitive signals may be ideally placed at least one row deep from the outside of the package.
Although depicted as stagger-in pads, the mesh connection pads may be optionally stagger-in or stagger-out. A staggered configuration of pads allows for a higher density of pins which in turn allows the protection bond wires to be placed closer to one another, increasing the physical protection of the surrounded signal bond wire. In addition or alternatively, mesh connection pads may be in-line bond pads. Additionally, as depicted in
Protection wires 340a-n are typically bonded to the set of outer contacts 316. A bond wire carrying a physically protected signal, such as signal 380a, typically has a protection bond wire on each side. The effective vertical mesh spacing 318 between the outer substrate contacts for these protection wires is determined by the minimum spacing between protective (stagger-in) pads and a signal (stagger-out) pad. In the example shown in
As depicted in
In the exemplary package 300, a set of signals 380a-d have been designated for physical protection. Another set of signals 385 have been designated as not requiring additional physical protection. These signals may be protected by logical security and/or may have been deemed to not require additional physical security. As shown in
In the protection circuit illustrated in
The driving pad 302a may be routed as a wire only connection between driving pad 302a and detection pad 302p. The wire is created using a bond wire to connect driving pad 302a (via pad landing 304a) to substrate contact 316a. Substrate contact 316a is connected to substrate 316b via a connection in the package substrate. A protection wire bond connects substrate contact 316b to protective pad 302b on the die. In an embodiment, pad 302b is an analog pad not tied to the substrate. The use of an analog pad in the protection circuit enables two different voltage levels to be used. Using this configuration, the protection/tamper detection circuit can remain active when the rest of the chip is powered off.
The pad landing 304b is connected to pad landing 304d using a metal connection (e.g., connected trace) on the die. As discussed above, this metal connection provides additional physical security for the signal trace carrying protected signal 380a. Signal pad 302c, between protective pads 302b and d, receives physically protected signal 380a. A bond wire connects protection pad 302d to substrate contact 316c which is connected to substrate contact 316d. Thus, the protection circuit effectively bypasses the unprotected signals 385. A wire bond connects substrate contact 316d to protection pad 302i which is connected to protection pad 302k using a metal connection which is then wire bonded off die to substrate contact 316e. The signal bond wire carrying physically protected signal 380b is surrounded by protection bond wires 340d and 340e. This zig zag pattern continues until the last substrate outer contact 316h is bonded to detection pad 302p, creating the tamper detection circuit. The signal from the detection pad 304p is routed to an external detection circuit. An exemplary external detection circuit is described in U.S. patent application Ser. No. 12/210,013. In an embodiment, the zig zag mesh pattern is extended to cover the entire die.
A pad ring, a portion of which is depicted in
Package 500 includes two driving pads 502a, b (one for each polarity) and two detection pads 502x, y (one for each polarity). The detection circuits are configured to provide bond wire protection for sensitive signals 580a-f.
Because there are two separate tamper detection circuits (complete wires), an even number of on/off pads 590 are needed around the protected signal areas as shown in
Additionally, the two tamper detection circuit routes on the package may be alternated from being on the inside to the outside for connection to the next bond wire. This configuration prevents an attacker from shorting the signal at the package substrate layer. The metal connections on the die may similarly be alternated. The opposing tamper detection circuit polarities may further be aligned in the horizontal plane of the die and package to make bypass of the signals difficult.
3.0 Die Mesh Protection
A die, such as die 202 depicted in
Die 602 may also include a single or dual layer metal mesh above the active die area. The additional metal layer(s) may be driven by tamper detection signals from tamper logic located in the secure area of the die.
Additionally, a dual layer mesh can be utilized provided the upper layer mesh protects the lower layer mesh connections. Ideally, the upper layer mesh connections are protected by the lower layer mesh.
4.0 Package Level Protection
The bond wire protection described above provides protection against attacks to the package from the sides or at angles. However, an attacker can also attack a package from the top (e.g., to place a tap inside the die). Techniques are required to increase the difficulty of such attacks as well as to detect top attacks and take protective action such as erase sensitive information (e.g., cryptographic key material).
Typically, protection from and detection of top attacks to the package are provide via a mesh grid located on the die. A limitation of these internal die mesh techniques is that mesh grid protection is required to be manufactured in every die, regardless of the needs of the customer. The embodiments depicted in
4.1 Stacked Die Approach
The stacked die embodiments of
4.2 Package on Package Approach
In package 1600, no custom molded encapsulate is required. Instead, the ball grid array of mesh substrate 1670 is coupled to spacers in the encapsulate layer on lower substrate 1604. In this embodiment, the height of the balls in the ball grid array is not tied to the height of the die or encapsulate.
The package on package embodiments of
5.0 Conclusion
While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example only, and not limitation. It will be apparent to persons skilled in the relevant art that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
This application is a continuation of U.S. patent application Ser. No. 12/330,336, filed on Dec. 8, 2008, which claims the benefit of U.S. Provisional Application No. 61/012,013, filed on Dec. 6, 2007, both of which are incorporated herein by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
4833618 | Verma et al. | May 1989 | A |
5288949 | Crafts | Feb 1994 | A |
5723906 | Rush | Mar 1998 | A |
5861662 | Candelore | Jan 1999 | A |
6496119 | Otterstedt et al. | Dec 2002 | B1 |
6858945 | Rakshani | Feb 2005 | B2 |
6930381 | Cornelius | Aug 2005 | B1 |
7158986 | Oliver et al. | Jan 2007 | B1 |
7259457 | Zhang et al. | Aug 2007 | B2 |
7343626 | Gallagher | Mar 2008 | B1 |
7539632 | Chakrabarti et al. | May 2009 | B1 |
7723998 | Doi | May 2010 | B2 |
7836051 | Mason | Nov 2010 | B1 |
7868441 | Eaton et al. | Jan 2011 | B2 |
7925691 | Westphal | Apr 2011 | B2 |
8502396 | Buer et al. | Aug 2013 | B2 |
20040227549 | Solie | Nov 2004 | A1 |
20050102358 | Gold et al. | May 2005 | A1 |
20060123376 | Vogel et al. | Jun 2006 | A1 |
20060195442 | Cone et al. | Aug 2006 | A1 |
20060253579 | Dixon et al. | Nov 2006 | A1 |
20060253583 | Dixon et al. | Nov 2006 | A1 |
20070011023 | Silverbrook | Jan 2007 | A1 |
20070155328 | Turner | Jul 2007 | A1 |
20070235846 | Lee et al. | Oct 2007 | A1 |
20080109473 | Dixon et al. | May 2008 | A1 |
20080126176 | Iguchi | May 2008 | A1 |
20080172382 | Prettejohn | Jul 2008 | A1 |
20080278217 | Hankhofer et al. | Nov 2008 | A1 |
20090024605 | Yang | Jan 2009 | A1 |
20090077669 | Buer | Mar 2009 | A1 |
20090112974 | Ravikumar et al. | Apr 2009 | A1 |
20090146270 | Buer et al. | Jun 2009 | A1 |
20090216577 | Killebrew | Aug 2009 | A1 |
20090222907 | Guichard | Sep 2009 | A1 |
20120256305 | Kaufman et al. | Oct 2012 | A1 |
Number | Date | Country |
---|---|---|
0 268 142 | May 1988 | EP |
0 860 882 | Aug 1998 | EP |
1 670 059 | Jun 2006 | EP |
09-27512 | Jan 1997 | JP |
WO 2007091210 | Aug 2007 | WO |
Entry |
---|
International Search Report with Written Opinion of the International Searching Authority for Int'l Patent Application No. PCT/US2008/013477, completed on Jan. 23, 2009, and mailed on Feb. 17, 2009, 13 pages. |
Notification Concerning Transmittal of International Preliminary Report on Patentability for International Application No. PCT/US2008/013477, dated Jun. 17, 2010, 7 pages. |
European Search Report for related European Patent Application No. 08 85 6321, European Patent Office, Munich, Germany, mailed Feb. 6, 2014; 7 pages. |
European Search Report for related European Patent Application No. 08 85 6321, European Patent Office, Munich, Germany, mailed Jan. 24, 2014; 3 pages. |
English-language Abstract of Japanese Patent Application Publication No. 09-27512; 2 pages. |
Number | Date | Country | |
---|---|---|---|
20140035136 A1 | Feb 2014 | US |
Number | Date | Country | |
---|---|---|---|
61012013 | Dec 2007 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12330336 | Dec 2008 | US |
Child | 13925673 | US |