2020
DOI: 10.1109/tc.2020.3020777
|View full text |Cite
|
Sign up to set email alerts
|

2.5D Root of Trust: Secure System-Level Integration of Untrusted Chiplets

Abstract: Dedicated, after acceptance and publication, in memory of the late Vassos Soteriou. For the first time, we leverage the 2.5D interposer technology to establish system-level security in the face of hardware-and software-centric adversaries. More specifically, we integrate chiplets (i.e., third-party hard intellectual property of complex functionality, like microprocessors) using a security-enforcing interposer. Such hardware organization provides a robust 2.5D root of trust for trustworthy, yet powerful and fle… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 38 publications
0
13
0
Order By: Relevance
“…For example, the NAND-NOR-XOR primitive of [50] would incur 5.5× power, 1.6× delay, and 4× area cost compared to a regular NAND gate. 4 In contrast, the work in [184] report on average only 25% power cost, 15% delay cost, and 43% area savings compared to regular 2D gates.…”
Section: Confidentiality and Integrity Of Hardwarementioning
confidence: 96%
See 3 more Smart Citations
“…For example, the NAND-NOR-XOR primitive of [50] would incur 5.5× power, 1.6× delay, and 4× area cost compared to a regular NAND gate. 4 In contrast, the work in [184] report on average only 25% power cost, 15% delay cost, and 43% area savings compared to regular 2D gates.…”
Section: Confidentiality and Integrity Of Hardwarementioning
confidence: 96%
“…Trojan detection at runtime, however, can benefit from 3D and 2.5D integration. That is because related security features can be implemented separately using a trusted fabrication process and integrated/stacked later on with the commodity chip(s) to be monitored [4,81]; see also the discussion on data security below. 4.2.5 Confidentiality and Integrity of Hardware: PUFs.…”
Section: Confidentiality and Integrity Of Hardware: Trojan Defensementioning
confidence: 99%
See 2 more Smart Citations
“…Overall, since chiplets could provide customizability and optimizability in multiple dimensions (such as the yield and cost), it would be widely applied in more fields [33,34]. With the rapid rise of open-source ecology and agile development [35] in the chip field, chiplet approach would become the mainstream technology for chip development in the future.…”
Section: Applications and Development Trends Of Chipletsmentioning
confidence: 99%