Knechtel et al., 2019 - Google Patents
3D integration: Another dimension toward hardware securityKnechtel et al., 2019
View PDF- Document ID
- 12815433102220102132
- Author
- Knechtel J
- Patnaik S
- Sinanoglu O
- Publication year
- Publication venue
- 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS)
External Links
Snippet
We review threats and selected schemes concerning hardware security at design and manufacturing time as well as at runtime. We find that 3D integration can serve well to enhance the resilience of different hardware security schemes, but it also requires thoughtful …
- 238000004519 manufacturing process 0 abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- H—ELECTRICITY
- H01—BASIC ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
- H01L2924/00—Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
- H01L2924/0001—Technical content checked by a classifier
- H01L2924/0002—Not covered by any one of groups H01L24/00, H01L24/00 and H01L2224/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H01—BASIC ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
- H01L23/00—Details of semiconductor or other solid state devices
- H01L23/552—Protection against radiation, e.g. light or electromagnetic waves
-
- H—ELECTRICITY
- H01—BASIC ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
- H01L23/00—Details of semiconductor or other solid state devices
- H01L23/57—Protection from inspection, reverse engineering or tampering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Knechtel et al. | 3D integration: Another dimension toward hardware security | |
| Xie et al. | Security and vulnerability implications of 3D ICs | |
| Xiao et al. | Hardware trojans: Lessons learned after one decade of research | |
| Xiao et al. | Efficient and secure split manufacturing via obfuscated built-in self-authentication | |
| Nabeel et al. | 2.5 D root of trust: Secure system-level integration of untrusted chiplets | |
| Xiao et al. | A novel built-in self-authentication technique to prevent inserting hardware trojans | |
| Tehranipoor et al. | A survey of hardware trojan taxonomy and detection | |
| Gu et al. | Leveraging 3D technologies for hardware security: Opportunities and challenges | |
| Knechtel | Hardware security for and beyond CMOS technology: an overview on fundamentals, applications, and challenges | |
| Valamehr et al. | A 3-D split manufacturing approach to trustworthy system development | |
| Shakya et al. | Introduction to hardware obfuscation: Motivation, methods and evaluation | |
| Khan et al. | Secure interposer-based heterogeneous integration | |
| Knechtel et al. | Protect your chip design intellectual property: An overview | |
| Patnaik et al. | A modern approach to IP protection and trojan prevention: Split manufacturing for 3D ICs and obfuscation of vertical interconnects | |
| Dofe et al. | Security threats and countermeasures in three-dimensional integrated circuits | |
| Vashistha et al. | Toshi-towards secure heterogeneous integration: Security risks, threat assessment, and assurance | |
| Yu et al. | Exploiting hardware obfuscation methods to prevent and detect hardware trojans | |
| Knechtel | Hardware security for and beyond CMOS technology | |
| Yang et al. | Making split-fabrication more secure | |
| Suzano et al. | On hardware security and trust for chiplet-based 2.5 D and 3D ICs: Challenges and Innovations | |
| Xie et al. | 2.5 D/3D integration technologies for circuit obfuscation | |
| Gao et al. | iprobe: Internal shielding approach for protecting against front-side and back-side probing attacks | |
| Patnaik et al. | Best of both worlds: Integration of split manufacturing and camouflaging into a security-driven CAD flow for 3D ICs | |
| SLPSK et al. | Treehouse: A secure asset management infrastructure for protecting 3dic designs | |
| Zhang et al. | Modeling hardware trojans in 3D ICs |