In today's integrated circuit (IC) ecosystem, owning a foundry is not economically viable, and therefore most IC design houses are now working under a fabless business model. In order to overcome security concerns associated with the outsorcing of IC fabrication, the Split Manufacturing technique was proposed. In Split Manufacturing, the Front End of Line (FEOL) layers (transistors and lower metal layers) are fabricated at an untrusted high-end foundry, while the Back End of Line (BEOL) layers (higher metal layers) are manufactured at a trusted low-end foundry. This approach hides the BEOL connections from the untrusted foundry, thus preventing overproduction and piracy threats. However, many works demonstrate that BEOL connections can be derived by exploiting layout characteristics that are introduced by heuristics employed in typical floorplanning, placement, and routing algorithms. Since straightforward Split Manufacturing may not afford a desirable security level, many authors propose defense techniques to be used along with Split Manufacturing. In our survey, we present a detailed overview of the technique, the many types of attacks towards Split Manufacturing, as well as possible defense techniques described in the literature. For the attacks, we present a concise discussion on the different threat models and assumptions, while for the defenses we classify the studies into three categories: proximity perturbation, wire lifting, and layout obfuscation. The main outcome of our survey is to highlight the discrepancy between many studies -- some claim netlists can be reconstructed with near perfect precision, while others claim marginal success in retrieving BEOL connections. Finally, we also discuss future trends and challenges inherent to Split Manufacturing, including the fundamental difficulty of evaluating the efficiency of the technique.
翻译:在当今的集成电路(IC)生态系统中,拥有铸造机在经济上不可行,因此,大多数IC设计厂现在都在一种可信赖的低端铸造机下工作。为了克服与IC制造的排流相关的安全顾虑,提出了分裂制造技术。在分解制造中,线端前层(晶体和低金属层)是在一种不可信的高端铸造机上制造的,而后端层(高金属层)则在经济上是不可行的,因此,大多数IC设计厂现在都在一种可信赖的低端铸造机下工作。这一方法将BELL的边缘再造机连接隐藏在不可信的铸造机上,从而防止过度生产和海盗威胁。然而,许多工程表明,BELLEOL的连接可以通过利用典型的地平面规划、放置和路程算法中采用的超光层结构特征来产生。由于直径直的分解制造可能无法提供合适的安全级别,因此,许多作者建议将防御技术与Splet Pride Pride Priforate(高金属层层层层)交替使用。在我们的调查中,我们对技术进行详细的技术的精确的解读,我们对技术、近的精确的精确的内端结构图进行的详细研究中,我们进行详细的研究, 将一系列的精确的连系的连系之间的连接连接,而将研究,我们对Slicalterricalticaldal 。在对Slicalmatical 和对三号进行一项研究中,我们进行一项研究,我们研究,最后的计算。我们进行一项研究,我们的理论的研究,最后的理论研究,我们对Slicalvic 。我们的理论的理论的理论的理论上关于Slicaldaldaldaldal 的理论上的研究,最后的理论上关于Sturdal 的理论上进行的理论上的研究,最后的理论,我们的理论的理论上关于Slical 的理论的理论上进行上关于Slical 和防御的理论上的理论,我们的理论上的理论上关于Servical 的理论上的理论的理论上的理论上的理论上的理论上的理论上的理论的理论上的理论上的理论上的理论上的理论上的理论上的理论上的理论上的理论