z-logo
open-access-imgOpen Access
IC Backside Tamper Detection using Impedance Sensing
Author(s) -
Tahoura Mosavirik,
Shahin Tajik
Publication year - 2025
Publication title -
ieee access
Language(s) - English
Resource type - Magazines
SCImago Journal Rank - 0.587
H-Index - 127
eISSN - 2169-3536
DOI - 10.1109/access.2025.3572694
Subject(s) - aerospace , bioengineering , communication, networking and broadcast technologies , components, circuits, devices and systems , computing and processing , engineered materials, dielectrics and plasmas , engineering profession , fields, waves and electromagnetics , general topics for engineers , geoscience , nuclear engineering , photonics and electrooptics , power, energy and industry applications , robotics and control systems , signal processing and analysis , transportation
The expansion of flip-chip technologies and lack of backside protection made integrated circuits (ICs) vulnerable to certain classes of physical attacks mounted from the IC’s backside, including laser-assisted probing, electromagnetic side-channel analysis, body biasing injection (BBI), and focused ion beam (FIB) editing. Existing countermeasures are expensive, incompatible with standard IC fabrication, and unsuitable for legacy systems such as field-programmable gate arrays (FPGAs), which are widely used in industrial and defense systems. In this paper, we demonstrate how impedance monitoring of the printed circuit board (PCB) and the IC package’s power distribution network (PDN) using on-chip circuit-based network analyzers can detect IC backside tampering. Our method is based on the fact that any attempt to expose the backside silicon substrate, such as the removal of the fan and heatsinks, or polishing it, leads to changes in the equivalent impedance of the package’s PDN, and hence scanning the package impedance will reveal if the package integrity has been violated. To validate our claims, we deployed an on-FPGA network analyzer on an AMD Zynq UltraScale+ MPSoC (16 nm), which is part of a multi-PCB system.We performed a series of backside tamper attacks, including the removal of cooling components and IC backside silicon milling/polishing, across different temperatures, and evaluated detection effectiveness leveraging the difference of means as the statistical metric.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here