Cryptology ePrint Archive: Report 2019/290

Cost effective techniques for chip delayering and in-situ depackaging

Philippe Loubet Moundi

Abstract: Invasive or semi-invasive attacks require, of course, because of their nature, the removal of metal layers or at least the package de-capsulation of the chip. For many people - not expert in those sample preparation techniques - the simple access to the die surface and the observation of the chip structure after metal layers removal are the first obstacles to conduct an attack. In another direction, the development of embedded secure devices, sometime with very dense and complex assembly process, adds a new difficulty for an attacker to get a physical access to the silicon without intensive use of advanced soldering capabilities. This paper will deal with those two challenges: the first one is to provide an in-situ depackaging solution with limited ressources and then, the second one consists in finding the minimum mandatory tools required to perform chip delayering before metal layers imaging - or reverse engineering.

Category / Keywords: package removal, delayering, decapsulation, depackaging, reverse engineering, invasive attacks, semi-invasive attacks, sample preparation

Date: received 13 Mar 2019, last revised 20 Mar 2019

Contact author: philippe loubet-moundi at gemalto com

Available format(s): PDF | BibTeX Citation

Note: This paper was submitted to Cosade 2013 and presented in the short track session

Version: 20190320:095826 (All versions of this report)

Short URL: ia.cr/2019/290


[ Cryptology ePrint archive ]