Proceedings of the 26th Edition on Great Lakes Symposium on VLSI 2016
DOI: 10.1145/2902961.2903512
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging 3D Technologies for Hardware Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 28 publications
0
14
0
Order By: Relevance
“…Overall, since chiplets could provide customizability and optimizability in multiple dimensions (such as the yield and cost), it would be widely applied in more fields [33,34]. With the rapid rise of open-source ecology and agile development [35] in the chip field, chiplet approach would become the mainstream technology for chip development in the future.…”
Section: Applications and Development Trends Of Chipletsmentioning
confidence: 99%
“…Overall, since chiplets could provide customizability and optimizability in multiple dimensions (such as the yield and cost), it would be widely applied in more fields [33,34]. With the rapid rise of open-source ecology and agile development [35] in the chip field, chiplet approach would become the mainstream technology for chip development in the future.…”
Section: Applications and Development Trends Of Chipletsmentioning
confidence: 99%
“…2.5D and 3D integration is a substantial contribution to a possible security increase in IC fabrication. These chip composition techniques are emerging especially in relation with split fabrication processes that should assure the genuineness of IC production in offshore foundries [1][2][3][4][5][6]. Solving supply chain issues is not an aim of our work, and so we will refer readers to the above-mentioned papers for more information on that subject.…”
Section: Complex Integration and Camouflagingmentioning
confidence: 99%
“…Recently, we have seen many papers covering split manufacturing process that allows building reliable and trustworthy devices, at least from the producers' perspective [1][2][3][4][5][6]. In this paper we would like to propose possible techniques for hindering attempts on gaining knowledge from physical examination of chips.…”
Section: Introductionmentioning
confidence: 99%
“…This way, we may benefit from the latest technology node but, naturally, have to split the design in such a way that the foundries 1 We acknowledge that the idea for 3D SM was envisioned in 2008 by Tezzaron [31]. Also, there are studies hinting at the benefits of 3D integration for SM [32][33][34][35][36] cannot readily infer the whole layout, even when they are colluding. Once such strong protection is in place, it is economically more reasonable to commission only one foundry.…”
Section: D Integration: Our Concept For Ip Protection In the Next Dimentioning
confidence: 99%