Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/33210
DC FieldValueLanguage
dc.contributor.authorChacon, Gino A.-
dc.contributor.authorWilliams, Charles-
dc.contributor.authorKnechtel, Johann-
dc.contributor.authorSinanoglu, Ozgur-
dc.contributor.authorGratz, Paul V.-
dc.contributor.authorSoteriou, Vassos-
dc.date.accessioned2024-11-21T11:13:51Z-
dc.date.available2024-11-21T11:13:51Z-
dc.date.issued2024-02-15-
dc.identifier.citationACM Transactions on Architecture and Code Optimization, 2024, vol. 21, iss. 2, article number 23en_US
dc.identifier.issn15443566-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/33210-
dc.description.abstractIndustry is moving towards large-scale hardware systems that bundle processor cores, memories, accelerators, and so on. via 2.5D integration. These components are fabricated separately as chiplets and then integrated using an interposer as an interconnect carrier. This new design style is beneficial in terms of yield and economies of scale, as chiplets may come from various vendors and are relatively easy to integrate into one larger sophisticated system. However, the benefits of this approach come at the cost of new security challenges, especially when integrating chiplets that come from untrusted or not fully trusted, third-party vendors.In this work, we explore these challenges for modern interposer-based systems of cache-coherent, multi-core chiplets. First, we present basic coherence-oriented hardware Trojan attacks that pose a significant threat to chiplet-based designs and demonstrate how these basic attacks can be orchestrated to pose a significant threat to interposer-based systems. Second, we propose a novel scheme using an active interposer as a generic, secure-by-construction platform that forms a physical root of trust for modern 2.5D systems. The implementation of our scheme is confined to the interposer, resulting in little cost and leaving the chiplets and coherence system untouched. We show that our scheme prevents a range of coherence attacks with low overheads on system performance, g1/44%. Further, we demonstrate that our scheme scales efficiently as system size and memory capacities increase, resulting in reduced performance overheads.en_US
dc.formatPDFen_US
dc.language.isoenen_US
dc.relation.ispartofACM Transactions on Architecture and Code Optimizationen_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internationalen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectCoherence attacksen_US
dc.subjectCoherence systemsen_US
dc.subjectcountermeasuresen_US
dc.subjectinterposer Technologyen_US
dc.titleCoherence Attacks and Countermeasures in Interposer-based Chiplet Systemsen_US
dc.typeArticleen_US
dc.collaborationNew York Universityen_US
dc.collaborationCyprus University of Technologyen_US
dc.collaborationTexas A and M Universityen_US
dc.subject.categoryNano-Technologyen_US
dc.journalsOpen Accessen_US
dc.countryUnited Statesen_US
dc.countryUnited Arab Emiratesen_US
dc.countryCyprusen_US
dc.subject.fieldEngineering and Technologyen_US
dc.publicationPeer Revieweden_US
dc.identifier.doi10.1145/3633461en_US
dc.identifier.scopus2-s2.0-85194401768-
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/85194401768-
dc.relation.issue2en_US
dc.relation.volume21en_US
cut.common.academicyear2024-2025en_US
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.openairetypearticle-
item.cerifentitytypePublications-
item.grantfulltextnone-
item.languageiso639-1en-
item.fulltextNo Fulltext-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-2818-0459-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Άρθρα/Articles
CORE Recommender
Show simple item record

Page view(s)

8
checked on Nov 24, 2024

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons