1. Technical Field
The present disclosure relates to a method for protecting an integrated circuit against attacks aiming to discover sensitive data stored or handled by the integrated circuit. The present disclosure particularly relates to attacks made by means of a light beam such as a laser beam, through the semiconductor substrate on which the circuit is formed.
2. Description of the Related Art
Integrated circuits are vulnerable to attacks on their physical structure, and aiming to discover information they store or handle or to change their operating characteristics. Some attacks involve performing a reading or injecting a signal on an interconnection path, particularly using a laser beam.
The most frequently used means against this type of attack involves using a passive or active shield. Passive shields are generally formed on the circuit's layers of insulator and interconnection paths, that are themselves formed on an active area of a semiconductor substrate. However, such shields can be removed or pierced without the circuit thus protected being able to detect it. On the contrary, active shields are linked to the circuit to enable it to detect when they are removed or pierced. The circuit can then take any appropriate measure to preserve the confidentiality of sensitive information.
For miniaturization reasons in particular, some integrated circuits like those used in video decoders, implement the flip chip technology. This technology involves turning over the substrate of the integrated circuit to place the contact pads formed on the front side of the circuit, directly opposite the contact pads formed on a board such as a printed circuit board. The result is that the backside of the substrate is directly accessible to an attacker wanting to read the content of a memory for example. The protection consisting of forming a passive or active shield on the interconnection layers is thus inappropriate as the shield would then be opposite the printed circuit board and not on the backside of the substrate on which the integrated circuit is formed.
An attack of the integrated circuit CI thus connected onto the board SB1 can involve thinning down, by grinding, the circuit from the backside, i.e., the inactive side of the substrate, until the active area AL is reached. To show an attack of this type,
Some embodiments relate to a method for detecting an attack by laser beam on an electronic microcircuit, comprising forming the microcircuit on a semiconductor substrate, the microcircuit comprising a circuit to be protected against attacks, the method comprising: forming photodiodes between components of the circuit to be protected, forming a comparing circuit configured to compare a signal supplied by each photodiode with a threshold value, and forming a signal circuit configured to activate a detection signal when a signal at output of one of the photodiodes crosses the threshold value.
According to one embodiment, the comparing circuit compares the signal supplied by each photodiode with a first threshold value chosen to distinguish whether the photodiode is not subjected to any light intensity or receives a light intensity.
According to one embodiment, the comparing circuit compares the signal supplied by each photodiode with a second threshold value, the second threshold value being chosen to distinguish whether the photodiode receives a light intensity corresponding to an ambient light or a laser beam used to attack the microcircuit.
According to one embodiment, the photodiodes are distributed over the circuit to be protected of the microcircuit according to a random configuration or as close as possible to sensitive components of the circuit to be protected.
According to one embodiment, the photodiodes are distributed over the circuit to be protected of the microcircuit according to a matrix configuration in rows and in columns transversal to the rows.
Some embodiments also relate to a microcircuit comprising a circuit to be protected against attacks by laser beam, photodiodes positioned between components of the circuit to be protected, and a detector circuit linked to the photodiodes, to compare light intensity signals supplied by the photodiodes with a threshold value, and to activate a detection signal when one of the light intensity signals crosses the threshold value.
According to one embodiment, the detector circuit comprises a first comparator linked to the photodiodes to compare the light intensity signal supplied by each photodiode with a first threshold value chosen to distinguish whether the photodiode is not subjected to any light intensity or receives a light intensity.
According to one embodiment, the detector circuit comprises a second comparator linked to the photodiodes to compare the light intensity signal supplied by each photodiode with a second threshold value chosen to distinguish whether the photodiode receives a light intensity corresponding to an ambient light or a laser beam used to attack the microcircuit.
According to one embodiment, the photodiodes are distributed over the circuit to be protected of the microcircuit according to a random configuration or as close as possible to sensitive components of the circuit to be protected.
According to one embodiment, the photodiodes are distributed over the circuit to be protected of the microcircuit according to a matrix configuration in rows and in columns transversal to the rows.
Some examples of embodiments of the present disclosure will be described below in relation with, but not limited to, the following figures, in which:
The integrated circuit CI of
It is thus desirable to be capable of efficiently protecting an integrated circuit against backside attacks. It is also desirable that this protection does not increase the manufacturing cost of the integrated circuit.
According to one embodiment, the integrated circuit CI1 comprises a protection device comprising one or more photodiodes PHD disposed in or in the vicinity of sensitive areas of the integrated circuit. Each photodiode PHD supplies a signal representative of a light intensity received by the photodiode. In the example in
Therefore,
The output of the comparator CP1 is connected to the input of a processing circuit WB which can be configured merely to activate an attack detection signal DT when the comparator CP1 indicates that a light intensity signal coming from a photodiode is above the threshold value Vr1. The circuit WB can also be configured to take or trigger any appropriate measure in the event of an attack, like erasing one or more memories containing sensitive data, locking or cutting off the power supply of the integrated circuit CI1 or of certain circuits of the integrated circuit CI1, etc. The activation of the detection signal DT can be simply stored in a permanent manner in a circuit of the microcircuit. Such storing can then be used every time the microcircuit is started to put the latter into a degraded operating mode.
The multiplexer MUX can be controlled to successively acquire the light intensity signal at output of each photodiode PHD, and send it to the comparator CP1.
According to another embodiment, provision may further be made for as many comparators as photodiodes PHD, each comparator comparing the light intensity signal at output of a photodiode with the threshold value Vr1. The output of each comparator is connected to an input of an OR logic gate, replacing the multiplexer MUX and supplying the detection signal DT. The signal DT is thus in the active state when at least one of the photodiodes PHD detects a light intensity above the light intensity threshold corresponding to the threshold value Vr1.
According to one embodiment, the circuit DETC comprises a second comparator CP2 to compare the light intensity signal of a photodiode, selected by the multiplexer MUX with another threshold value Vr2, greater than the threshold value Vr1.
The threshold value Vr2 is for example a reference voltage chosen to distinguish when a photodiode is merely subjected to an ambient light and when the photodiode is subjected to a laser beam used to attack the integrated circuit, once thinned. The comparator CP2 supplies the circuit WB with a comparison signal. Therefore, the circuit WB can select a protective measure according to the signals supplied by the two comparators CP1, CP2. If the circuit CI1, once thinned, is kept in a dark environment, the comparators CP1, CP2 may not detect anything. However, the comparators CP1, CP2 can simultaneously supply an active signal when a laser beam passes over one of the photodiodes PHD. The detection signal DT can simply indicate whether the maximum light intensity detected by the photodiodes is lower than the threshold value Vr1, ranging between the threshold values Vr1 and Vr2, or above the threshold value Vr2. The detection signal DT can also indicate numbers of photodiodes having supplied a light intensity signal lower than the threshold value Vr1, ranging between the threshold values Vr1 and Vr2, and above the threshold value Vr2.
The formation of photodiodes in an integrated circuit is perfectly compatible with manufacturing techniques, and particularly photolithography techniques, implemented to produce logic circuits or memories, and requires no additional manufacturing steps. To illustrate this advantage,
In
It will be understood by those skilled in the art that various alternative embodiments and various applications of the present disclosure are possible. In particular, the disclosure is not limited to a specific protective measure triggered when an attack is detected. Indeed, the detection signal DT can merely be supplied outside the microcircuit to a warning device. This external warning device can furthermore be programmable according to several levels of security to conduct or trigger specific actions when error conditions are met, according to a level of security it has received for example from the microcircuit.
The various embodiments described above can be combined to provide further embodiments. These and other changes can be made to the embodiments in light of the above-detailed description. In general, in the following claims, the terms used should not be construed to limit the claims to the specific embodiments disclosed in the specification and the claims, but should be construed to include all possible embodiments along with the full scope of equivalents to which such claims are entitled. Accordingly, the claims are not limited by the disclosure.
Number | Date | Country | Kind |
---|---|---|---|
12 54759 | May 2012 | FR | national |
Number | Name | Date | Kind |
---|---|---|---|
4440172 | Langer | Apr 1984 | A |
4740708 | Batchelder | Apr 1988 | A |
5053992 | Gilberg et al. | Oct 1991 | A |
5227313 | Gluck et al. | Jul 1993 | A |
5244817 | Hawkins et al. | Sep 1993 | A |
5325430 | Smyth et al. | Jun 1994 | A |
5606482 | Witmer | Feb 1997 | A |
6168965 | Malinovich et al. | Jan 2001 | B1 |
6169319 | Malinovich et al. | Jan 2001 | B1 |
20020130248 | Bretschneider et al. | Sep 2002 | A1 |
20030141434 | Ishikawa et al. | Jul 2003 | A1 |
20060081912 | Wagner et al. | Apr 2006 | A1 |
20060180939 | Matsuno | Aug 2006 | A1 |
20090201393 | Tai et al. | Aug 2009 | A1 |
20090294811 | Rhodes et al. | Dec 2009 | A1 |
20100159632 | Rhodes et al. | Jun 2010 | A1 |
20100178722 | de Graff et al. | Jul 2010 | A1 |
20110168875 | Okuda | Jul 2011 | A1 |
20120175571 | Sarkar | Jul 2012 | A1 |
20120320480 | Lisart et al. | Dec 2012 | A1 |
20130100559 | Kuenemund et al. | Apr 2013 | A1 |
20130200371 | Marinet et al. | Aug 2013 | A1 |
20130278284 | Watanabe et al. | Oct 2013 | A1 |
20130314121 | Mougin et al. | Nov 2013 | A1 |
Number | Date | Country |
---|---|---|
19601390 | Jul 1997 | DE |
10101281 | Jun 2002 | DE |
Number | Date | Country | |
---|---|---|---|
20130314121 A1 | Nov 2013 | US |