Layout Recognition Attacks on Split Manufacturing Conference Paper uri icon


  • 2019 Association for Computing Machinery. One technique to prevent attacks from an untrusted foundry is split manufacturing, where only a part of the layout is sent to the untrusted high-end foundry, and the rest is manufactured at a trusted low-end foundry. The untrusted foundry has front-end-of-line (FEOL) layout and the original circuit netlist and attempts to identify critical components on the layout for Trojan insertion. Although defense methods for this scenario have been developed, the corresponding attack technique is not well explored. For instance, Boolean satisfiability (SAT) based bijective mapping attack is mentioned without detailed research. Hence, the defense methods are mostly evaluated with the k-security metric without actual attacks. We provide the first systematic study, to the best of our knowledge, on attack techniques in this scenario. Besides of implementing SAT-based bijective mapping attack, we develop a new attack technique based on structural pattern matching. Experimental comparison with bijective mapping attack shows that the new attack technique achieves about the same success rate with much faster speed for cases without the k-security defense, and has a much better success rate at the same runtime for cases with k-security defense. The results offer an alternative and practical interpretation for k-security in split manufacturing.

name of conference

  • Proceedings of the 24th Asia and South Pacific Design Automation Conference

published proceedings


author list (cited authors)

  • Xu, W., Feng, L., Rajendran, J. J., & Hu, J.

citation count

  • 9

complete list of authors

  • Xu, Wenbin||Feng, Lang||Rajendran, Jeyavijayan Jv||Hu, Jiang

publication date

  • January 2019