{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T13:57:54Z","timestamp":1764251874946,"version":"build-2065373602"},"reference-count":35,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2024,4,6]],"date-time":"2024-04-06T00:00:00Z","timestamp":1712361600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF","award":["2016624"],"award-info":[{"award-number":["2016624"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Recent decades have witnessed a remarkable pace of innovation and performance improvements in integrated circuits (ICs), which have become indispensable in an array of critical applications ranging from military infrastructure to personal healthcare. Meanwhile, recent developments have brought physical security to the forefront of concern, particularly considering the valuable assets handled and stored within ICs. Among the various invasive attack vectors, micro-probing attacks have risen as a particularly menacing threat. These attacks leverage advanced focused ion beam (FIB) systems to enable post-silicon secret eavesdropping and circuit modifications with minimal traceability. As an evolved variant of micro-probing attacks, reroute attacks possess the ability to actively disable built-in shielding measures, granting access to the security-sensitive signals concealed beneath. To address and counter these emerging challenges, we introduce a layout-level framework known as Detour-RS. This framework is designed to automatically assess potential vulnerabilities, offering a systematic approach to identifying and mitigating exploitable weaknesses. Specifically, we employed a combination of linear and nonlinear programming-based approaches to identify the layout-aware attack costs in reroute attempts given specific target assets. The experimental results indicate that shielded designs outperform non-shielded structures against reroute attacks. Furthermore, among the two-layer shield configurations, the orthogonal layout exhibits better performance compared to the parallel arrangement. Furthermore, we explore both independent and dependent scenarios, where the latter accounts for potential interference among circuit edit locations. Notably, our results demonstrate a substantial near 50% increase in attack cost when employing the more realistic dependent estimation approach. In addition, we also propose time and gas consumption metrics to evaluate the resource consumption of the attackers, which provides a perspective for evaluating reroute attack efforts. We have collected the results for different categories of target assets and also the average resource consumption for each via, required during FIB reroute attack.<\/jats:p>","DOI":"10.3390\/cryptography8020013","type":"journal-article","created":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T03:11:33Z","timestamp":1712545893000},"page":"13","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource"],"prefix":"10.3390","volume":"8","author":[{"given":"Minyan","family":"Gao","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA"}]},{"given":"Liton Kumar","family":"Biswas","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA"}]},{"given":"Navid","family":"Asadi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2794-7320","authenticated-orcid":false,"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, USA"}]}],"member":"1968","published-online":{"date-parts":[[2024,4,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Volya, D., Zhang, T., Alam, N., Tehranipoor, M., and Mishra, P. (2023, January 1\u20134). Towards Secure Classical-Quantum Systems. Proceedings of the 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), San Jose, CA, USA.","DOI":"10.1109\/HOST55118.2023.10133344"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Zhang, T., Park, J., Tehranipoor, M., and Farahmandi, F. (2021, January 5\u20139). PSC-TG: RTL power side-channel leakage assessment with test pattern generation. Proceedings of the 2021 58th ACM\/IEEE Design Automation Conference (DAC), San Francisco, CA, USA.","DOI":"10.1109\/DAC18074.2021.9586210"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Zhang, T., Rahman, M.L., Kamali, H.M., Azar, K.Z., Tehranipoor, M., and Farahmandi, F. (June, January 30). FISHI: Fault Injection Detection in Secure Heterogeneous Integration via Power Noise Variation. Proceedings of the 2023 IEEE 73rd Electronic Components and Technology Conference (ECTC), Orlando, FL, USA.","DOI":"10.1109\/ECTC51909.2023.00377"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Tajik, S., Lohrke, H., Seifert, J.P., and Boit, C. (November, January 30). On the power of optical contactless probing: Attacking bitstream encryption of FPGAs. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA.","DOI":"10.1145\/3133956.3134039"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Zhang, T., Tehranipoor, M., and Farahmandi, F. (2023, January 22\u201326). BitFREE: On Significant Speedup and Security Applications of FPGA Bitstream Format Reverse Engineering. Proceedings of the 2023 IEEE European Test Symposium (ETS), Venezia, Italy.","DOI":"10.1109\/ETS56758.2023.10174155"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"38379","DOI":"10.1109\/ACCESS.2019.2901949","article-title":"A comprehensive FPGA reverse engineering tool-chain: From bitstream to RTL code","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Gao, M., and Forte, D. (2022, January 14\u201316). iPROBE-O: FIB-aware Place and Route for Probing Protection Using Orthogonal Shields. Proceedings of the 2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Singapore.","DOI":"10.1109\/AsianHOST56390.2022.10022018"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"4541","DOI":"10.1109\/TCAD.2023.3276525","article-title":"iPROBE: Internal Shielding Approach for Protecting Against Front-side and Back-side Probing Attacks","volume":"42","author":"Gao","year":"2023","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Helfmeier, C., Boit, C., Nedospasov, D., and Seifert, J.P. (2013, January 2\u20133). Cloning Physically Unclonable Functions. Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Austin, TX, USA.","DOI":"10.1109\/HST.2013.6581556"},{"key":"ref_10","unstructured":"Ray, V. (2009, January 23). Freud applications of fib: Invasive fib attacks and countermeasures in hardware security devices. Proceedings of the East-Coast Focused Ion Beam User Group Meeting, Washington, DC, USA."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Cioranesco, J.M., Danger, J.L., Graba, T., Guilley, S., Mathieu, Y., Naccache, D., and Ngo, X.T. (2014, January 6\u20137). Cryptographically secure shields. Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Arlington, VA, USA.","DOI":"10.1109\/HST.2014.6855563"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ling, M., Wu, L., Li, X., Zhang, X., Hou, J., and Wang, Y. (2012, January 17\u201318). Design of monitor and protect circuits against FIB attack on chip security. Proceedings of the 2012 Eighth International Conference on Computational Intelligence and Security, Guangzhou, China.","DOI":"10.1109\/CIS.2012.125"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Manich, S., Wamser, M.S., and Sigl, G. (2012, January 3\u20134). Detection of probing attempts in secure ICs. Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, San Francisco, CA, USA.","DOI":"10.1109\/HST.2012.6224333"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1109\/TVLSI.2019.2901449","article-title":"Probing Assessment Framework and Evaluation of Antiprobing Solutions","volume":"27","author":"Wang","year":"2019","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Gao, M., and Forte, D. (2023, January 1\u20134). Detour: Layout-aware Reroute Attack Vulnerability Assessment and Analysis. Proceedings of the 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), San Jose, CA, USA.","DOI":"10.1109\/HOST55118.2023.10132919"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1007\/s10854-013-1522-6","article-title":"Focused helium ion beam deposited low resistivity cobalt metal lines with 10 nm resolution: Implications for advanced circuit editing","volume":"25","author":"Wu","year":"2014","journal-title":"J. Mater. Sci. Mater. Electron."},{"key":"ref_17","first-page":"L18","article-title":"Sub-10-nm nanolithography with a scanning helium beam","volume":"27","author":"Sidorkin","year":"2009","journal-title":"J. Vac. Sci. Technol. Microelectron. Nanometer Struct. Process. Meas. Phenom."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Boit, C., Helfmeier, C., and Kerst, U. (2013, January 20). Security risks posed by modern IC debug and diagnosis tools. Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA.","DOI":"10.1109\/FDTC.2013.13"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Shi, Q., Asadizanjani, N., Forte, D., and Tehranipoor, M.M. (2016, January 3\u20135). A layout-driven framework to assess vulnerability of ICs to microprobing attacks. Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA.","DOI":"10.1109\/HST.2016.7495575"},{"key":"ref_20","first-page":"51","article-title":"Secure physical enclosures from covers with tamper-resistance","volume":"2019","author":"Immler","year":"2019","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref_21","unstructured":"Isaacs, P., Morris, T., Fisher, M.J., and Cuthbert, K. (2013, January 22\u201324). Tamper proof, tamper evident encryption technology. Proceedings of the Pan Pacific Symposium, Maui, HI, USA."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Trippel, T., Shin, K.G., Bush, K.B., and Hicks, M. (2023, January 10\u201314). T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing. Proceedings of the Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, Melbourne, Australia.","DOI":"10.1145\/3579856.3582837"},{"key":"ref_23","unstructured":"Skorobogatov, S. (2011). Introduction to Hardware Security and Trust, Springer."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/JSSC.2004.841038","article-title":"Design considerations for soft embedded programmable logic cores","volume":"40","author":"Wilton","year":"2005","journal-title":"IEEE J. Solid-State Circuits"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Schulze, T.E., Kwiat, K., Kamhoua, C., Chang, S.C., and Shi, Y. (2016, January 19\u201320). RECORD: Temporarily randomized encoding of combinational logic for resistance to data leakage from hardware trojan. Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), Yilan, Taiwan.","DOI":"10.1109\/AsianHOST.2016.7835566"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2007","DOI":"10.1109\/TVLSI.2018.2844180","article-title":"Combating data leakage trojans in commercial and ASIC applications with time-division multiplexing and random encoding","volume":"26","author":"Schulze","year":"2018","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"4186","DOI":"10.1109\/TCSI.2019.2927363","article-title":"A secure data-toggling SRAM for confidential data protection","volume":"66","author":"Ho","year":"2019","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Pathak, S.K., and Nirmala Devi, M. (2022, January 25\u201326). Preventing Data Leakage by Trojans in Commercial and ASIC Applications Using TDM and DES Encryption and Decryption. Proceedings of the International Conference on Signal Processing and Integrated Networks, Noida, India.","DOI":"10.1007\/978-981-99-1312-1_8"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ray, S., and Jin, Y. (2015, January 2\u20136). Security policy enforcement in modern SoC designs. Proceedings of the 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), Austin, TX, USA.","DOI":"10.1109\/ICCAD.2015.7372590"},{"key":"ref_30","first-page":"31","article-title":"Secure and flexible trace-based debugging of systems-on-chip","volume":"22","author":"Backer","year":"2016","journal-title":"ACM Trans. Des. Autom. Electron. Syst. (TODAES)"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2152","DOI":"10.1109\/TCAD.2019.2952133","article-title":"A Physical Design Flow Against Front-Side Probing Attacks by Internal Shielding","volume":"39","author":"Wang","year":"2020","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1109\/MDAT.2022.3213998","article-title":"Fpga-chain: Enabling holistic protection of fpga supply chain with blockchain technology","volume":"40","author":"Zhang","year":"2022","journal-title":"IEEE Des. Test"},{"key":"ref_33","unstructured":"(2023, January 14). Common Evaluation Platform v4.2. Available online: https:\/\/github.com\/mit-ll\/CEP."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"102002","DOI":"10.1109\/ACCESS.2019.2929274","article-title":"A benchmark suite of hardware trojans for on-chip networks","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1109\/TVLSI.2023.3322384","article-title":"SiPGuard: Run-Time System-in-Package Security Monitoring via Power Noise Variation","volume":"32","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/2\/13\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:24:03Z","timestamp":1760106243000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/8\/2\/13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,6]]},"references-count":35,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["cryptography8020013"],"URL":"https:\/\/doi.org\/10.3390\/cryptography8020013","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2024,4,6]]}}}