Step 39 may further comprise raising a security alarm when one or more perturbation attacks are detected. A security alarm may be raised in order to execute one or more security actions that enable the protection of the digital circuit against the detected perturbation attack(s). For example, a security action may consist of a passive action (such as doing nothing) or an active action (corrective action) such as stopping (permanently or temporarily) the running of the digital circuit 1, rebooting or restarting one or more parts of the integrated circuit device to which belongs the digital circuit 1, deleting or regenerating secret values (e.g. cryptographic keys). The security action may depend on the localization of the detected perturbation attack and/or on the security strategy/policy adopted for specific parts/localizations of the digital circuit 1.
Further, the localization of the detected one or more perturbation attacks may be performed in step 39 using at least one signal transmission line that is routed horizontally within the first metallic layer and at least one signal transmission lines that is routed vertically within the second metallic layer.
The method for the detection and localization of perturbation attacks enables advantageously a real-time detection and a precise localization of fault injection attacks such as power glitch, system clock tampering attacks, laser/light injection attacks, and EM injection attacks.