2019 IEEE High Performance Extreme Computing Conference (HPEC) 2019
DOI: 10.1109/hpec.2019.8916503
|View full text |Cite
|
Sign up to set email alerts
|

Emerging Applications of 3D Integration and Approximate Computing in High-Performance Computing Systems: Unique Security Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…(2) The Concealment of HTs Increases. Chiplet-based SoW poses new challenges to hardware security, as mentioned in [21][22][23][24][25][26], where third-party chiplet suppliers can implant a single HT's trigger logic and payload logic into separate chiplets. When the trigger logic in one chiplet is activated, it triggers the malicious payload logic located in another chiplet through the communication channel between chiplets, as shown in Figure 3.…”
Section: Motivationmentioning
confidence: 99%
“…(2) The Concealment of HTs Increases. Chiplet-based SoW poses new challenges to hardware security, as mentioned in [21][22][23][24][25][26], where third-party chiplet suppliers can implant a single HT's trigger logic and payload logic into separate chiplets. When the trigger logic in one chiplet is activated, it triggers the malicious payload logic located in another chiplet through the communication channel between chiplets, as shown in Figure 3.…”
Section: Motivationmentioning
confidence: 99%
“…the primary thought toward the rear of coherent locking confusion is that piece of the design is changed with a configurable module on the format degree. In the event that the module isn't initiated via the dressmaker, the chip will now not work as expected [4][5][6][7]. for the term of the set upmanufacture enactment way in a depended-on plan house, the chips might be initiated by means of opening the muddled trademark with a secret key that might be scorched into on-chip wires.…”
Section: Introductionmentioning
confidence: 99%