Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/19445
DC FieldValueLanguage
dc.contributor.authorNabeel, Mohammed-
dc.contributor.authorAshraf, Mohammed-
dc.contributor.authorPatnaik, Satwik-
dc.contributor.authorSoteriou, Vassos-
dc.contributor.authorSinanoglu, Ozgur-
dc.contributor.authorKnechtel, Johann-
dc.date.accessioned2020-11-20T06:15:02Z-
dc.date.available2020-11-20T06:15:02Z-
dc.date.issued2020-11-01-
dc.identifier.citationIEEE Transactions on Computers, 2020, vol. 69, no. 11, pp. 1611-1625en_US
dc.identifier.issn15579956-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/19445-
dc.description.abstractFor the first time, we leverage the 2.5D interposer technology to establish system-level security in the face of hardware- and software-centric adversaries. More specifically, we integrate chiplets (i.e., third-party hard intellectual property of complex functionality, like microprocessors) using a security-enforcing interposer. Such hardware organization provides a robust 2.5D root of trust for trustworthy, yet powerful and flexible, computation systems. The security paradigms for our scheme, employed firmly by design and construction, are: 1) stringent physical separation of trusted from untrusted components and 2) runtime monitoring. The system-level activities of all untrusted commodity chiplets are checked continuously against security policiesvia physically separated security features. Aside from the security promises, the good economics of outsourced supply chains are still maintained; the system vendor is free to procure chiplets from the open market, while only producing the interposer and assembling the 2.5D system oneself. We showcase our scheme using the Cortex-M0 core and the AHB-Lite bus by ARM, building a secure 64-core system with shared memories. We evaluate our scheme through hardware simulation, considering different threat scenarios. Finally, we devise a physical-design flow for 2.5D systems, based on commercial-grade design tools, to demonstrate and evaluate our 2.5D root of trust.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.relation.ispartofIEEE Transactions on Computersen_US
dc.rights© IEEEen_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectSecurityen_US
dc.subjectIntegrated circuitsen_US
dc.subjectThree-dimensional displaysen_US
dc.subjectHardwareen_US
dc.subjectRuntimeen_US
dc.subjectMonitoringen_US
dc.subjectSupply chainsen_US
dc.subjectHardware securityen_US
dc.subject2.5D integrationen_US
dc.subjectActive interposeren_US
dc.subjectChipletsen_US
dc.subjectMulti-core systemen_US
dc.subjectRuntime monitoringen_US
dc.subjectPoliciesen_US
dc.title2.5D Root of Trust: Secure System-Level Integration of Untrusted Chipletsen_US
dc.typeArticleen_US
dc.collaborationNew York University Abu Dhabien_US
dc.collaborationNew York Universityen_US
dc.collaborationCyprus University of Technologyen_US
dc.subject.categoryElectrical Engineering - Electronic Engineering - Information Engineeringen_US
dc.journalsSubscriptionen_US
dc.countryUnited Arab Emiratesen_US
dc.countryUSAen_US
dc.countryCyprusen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.identifier.doi10.1109/TC.2020.3020777en_US
dc.relation.issue11en_US
dc.relation.volume69en_US
cut.common.academicyear2020-2021en_US
dc.identifier.spage1611en_US
dc.identifier.epage1625en_US
item.openairetypearticle-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.languageiso639-1en-
item.fulltextNo Fulltext-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-2818-0459-
crisitem.author.parentorgFaculty of Engineering and Technology-
crisitem.journal.journalissn0018-9340-
crisitem.journal.publisherIEEE-
Appears in Collections:Άρθρα/Articles
CORE Recommender
Show simple item record

SCOPUSTM   
Citations

13
checked on Nov 6, 2023

WEB OF SCIENCETM
Citations

6
Last Week
1
Last month
0
checked on Oct 29, 2023

Page view(s) 50

383
Last Week
0
Last month
2
checked on Dec 4, 2024

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons