An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
Securing Computer Hardware Using 3D Integrated Circuit ({{{{{IC}}}}}) Technology and Split Manufacturing for Obfuscation
The fabrication of digital Integrated Circuits (ICs) is increasingly outsourced. Given this trend,
security is recognized as an important issue. The threat agent is an attacker at the IC foundry …
security is recognized as an important issue. The threat agent is an attacker at the IC foundry …
Leveraging 3D technologies for hardware security: Opportunities and challenges
3D die stacking and 2.5 D interposer design are promising technologies to improve
integration density, performance and cost. Current approaches face serious issues in …
integration density, performance and cost. Current approaches face serious issues in …
Invisimem: Smart memory defenses for memory bus side channel
A practically feasible low-overhead hardware design that provides strong defenses against
memory bus side channel remains elusive. This paper observes that smart memory, memory …
memory bus side channel remains elusive. This paper observes that smart memory, memory …
Large-scale 3D chips: Challenges and solutions for design automation, testing, and trustworthy integration
Three-dimensional (3D) integration of electronic chips has been advocated by both industry
and academia for many years. It is acknowledged as one of the most promising approaches …
and academia for many years. It is acknowledged as one of the most promising approaches …
Security and vulnerability implications of 3D ICs
Physical limit of transistor miniaturization has driven chip design into the third dimension. 3D
integration technology emerges as a viable option to improve chip performance and …
integration technology emerges as a viable option to improve chip performance and …
A 3-D split manufacturing approach to trustworthy system development
Securing the supply chain of integrated circuits is of utmost importance to computer security.
In addition to counterfeit microelectronics, the theft or malicious modification of designs in …
In addition to counterfeit microelectronics, the theft or malicious modification of designs in …
On mitigation of side-channel attacks in 3D ICs: Decorrelating thermal patterns from power and activity
Various side-channel attacks (SCAs) on ICs have been successfully demonstrated and also
mitigated to some degree. In the context of 3D ICs, however, prior art has mainly focused on …
mitigated to some degree. In the context of 3D ICs, however, prior art has mainly focused on …
An interposer-based root of trust: Seize the opportunity for secure system-level integration of untrusted chiplets
Leveraging 2.5 D interposer technology, we advocate the integration of untrusted commodity
components/chiplets with physically separate, entrusted logic components. Such …
components/chiplets with physically separate, entrusted logic components. Such …
Toleo: Scaling Freshness to Tera-scale Memory using CXL and PIM
Trusted hardware's freshness guarantee ensures that an adversary cannot replay an old
value in response to a memory read request. They rely on maintaining a version number for …
value in response to a memory read request. They rely on maintaining a version number for …