Publication | Closed Access
Leveraging 3D Technologies for Hardware Security
40
Citations
33
References
2016
Year
Unknown Venue
EngineeringInterposer DesignComputer ArchitectureMonolithic 3DComputer-aided DesignConfidential ComputingMulti-channel Memory ArchitectureHardware SecurityAdvanced Packaging (Semiconductors)Hardware Security SolutionElectronic Packaging3D Ic ArchitectureElectrical EngineeringChip On BoardComputer EngineeringComputer ScienceMicroelectronics3D PrintingData SecurityMicrofabricationDie Stacking3D Integration
3D die stacking and 2.5D interposer design are promising technologies to improve integration density, performance and cost. Current approaches face serious issues in dealing with emerging security challenges such as side channel attacks, hardware trojans, secure IC manufacturing and IP piracy. By utilizing intrinsic characteristics of 2.5D and 3D technologies, we propose novel opportunities in designing secure systems. We present: (i) a 3D architecture for shielding side-channel information; (ii) split fabrication using active interposers; (iii) circuit camouflage on monolithic 3D IC, and (iv) 3D IC-based security processing-in-memory (PIM). Advantages and challenges of these designs are discussed, showing that the new designs can improve existing countermeasures against security threats and further provide new security features.
| Year | Citations | |
|---|---|---|
Page 1
Page 1