-
公开(公告)号:US11030737B2
公开(公告)日:2021-06-08
申请号:US16573922
申请日:2019-09-17
Inventor: Mark M. Tehranipoor , Haoting Shen , Nidish Vashistha , Navid Asadizanjani , Mir Tanjidur Rahman , Damon Woodard
Abstract: A method of detecting hardware Trojans in an IC includes providing a golden IC layout data set or SEM image data taken at long dwelling time on an active area of the golden IC after polishing it from the backside. Next, the IC under authentication (IUA) sample is prepared for fast SEM imagining (shorter dwelling time) after backside thinning. Next step is to perform image processing on the IUA's SEM image, which includes histogram equalization with noise filtering using Gaussian and Median filters. In the last step, the IUA sample data with the shorter dwelling time is compared with the golden IC layout data or the golden image data from high quality (longer dwelling time) SEM scanning process. At the end the result of the comparison is used to identify hardware Trojans.
-
公开(公告)号:US20200090325A1
公开(公告)日:2020-03-19
申请号:US16573922
申请日:2019-09-17
Inventor: Mark M. Tehranipoor , Haoting Shen , Nidish Vashistha , Navid Asadizanjani , Mir Tanjidur Rahman , Damon Woodard
Abstract: A method of detecting hardware Trojans in an IC includes providing a golden IC layout data set or SEM image data taken at long dwelling time on an active area of the golden IC after polishing it from the backside. Next, the IC under authentication (IUA) sample is prepared for fast SEM imagining (shorter dwelling time) after backside thinning. Next step is to perform image processing on the IUA's SEM image, which includes histogram equalization with noise filtering using Gaussian and Median filters. In the last step, the IUA sample data with the shorter dwelling time is compared with the golden IC layout data or the golden image data from high quality (longer dwelling time) SEM scanning process. At the end the result of the comparison is used to identify hardware Trojans.
-