Anti-tamper Active Shield

ON Semiconductor offers an anti-tamper active shield architecture as one of the first steps to tackle information security, IP protection and anti-counterfeiting in ASIC design. ASIC tampering is a calculated attempt to alter the operation of a product or uncover proprietary information in the design or operation of an ASIC. Critical data of any kind can be a target. Counterfeiting activities like reverse engineering, stealing or copying intellectual property, and repurposing returned merchandise threaten suppliers and customers daily.

ON Semiconductor’s anti-tamper active shield satisfies three components of anti-tampering protection: resistance, detection and evidence.

ON Semiconductor’s anti-tamper active shield combats two specific ASIC tampering attack methods.

Tamper Attack Method Description
Microprobe An attacker will be unable to easily microprobe the IC surface to directly observe, manipulate or interfere with the internal workings of the IC.
Reverse Engineering Any attempt to reverse engineer an ASIC or portions of an ASIC are complicated due to the presence of the active shield.

ON Semiconductor’s anti-tamper active shield is a random plane filled curve that is built in top level metal over specific IP or sensitive areas of the ASIC. Multiple lines can be employed and each functions as a powered and active screen rather than blockage simply used to hide sensitive areas. The need for anti-tamper strategies is associated with aerospace and defense applications, but the exponential rise of personal electronics use is driving all market segments to explore anti-tampering methods and offerings.