Proceedings of the 5th Workshop on Embedded Systems Security 2010
DOI: 10.1145/1873548.1873549
|View full text |Cite
|
Sign up to set email alerts
|

Hardware trust implications of 3-D integration

Abstract: 3-D circuit-level integration is a chip fabrication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 45 publications
0
4
0
Order By: Relevance
“…Recently, 3D integrated circuits have emerged as a practical industrial option that reduces some design constraints, such as long interconnect, yield, and levels of integration. 3D has been proposed several times for security application [32] [33], but only very recently has it been advocated as a platform for the detection of intrusive side-channel attacks [34]. Also, the use of configurable shields against side-channel attacks has been explored [35].…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…Recently, 3D integrated circuits have emerged as a practical industrial option that reduces some design constraints, such as long interconnect, yield, and levels of integration. 3D has been proposed several times for security application [32] [33], but only very recently has it been advocated as a platform for the detection of intrusive side-channel attacks [34]. Also, the use of configurable shields against side-channel attacks has been explored [35].…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…We consider the trust issues of split manufacturing in [8] and establish that our threat model includes unintentional hardware design flaws and malicious software in the computation plane; the threats of hardware Trojans (i.e., malicious inclusions), physical tampering/probing, simple/differential power analysis, and compromising RF/acoustic/photonic emanations are outside the scope of our work. A first-order concern is whether the output of the unsecured foundry needs to be independently trustworthy for the joined system to provide certain trustworthy functions.…”
Section: Motivation For 3d Securitymentioning
confidence: 99%
“…If so, it would seem to obviate the purpose of the effort. For option 3, we found that the independence of a control plane from interference by the computation plane (through active corruption of the processing or passively, via withholding of services) is a primary requirement for trustworthy behavior of the control plane [8]. However, the control plane can often choose whether to establish dependencies on the computation plane.…”
Section: Motivation For 3d Securitymentioning
confidence: 99%
See 1 more Smart Citation