2019 IEEE 25th International Symposium on on-Line Testing and Robust System Design (IOLTS) 2019
DOI: 10.1109/iolts.2019.8854395
|View full text |Cite
|
Sign up to set email alerts
|

3D Integration: Another Dimension Toward Hardware Security

Abstract: We review threats and selected schemes concerning hardware security at design and manufacturing time as well as at runtime. We find that 3D integration can serve well to enhance the resilience of different hardware security schemes, but it also requires thoughtful use of the options provided by the umbrella term of 3D integration. Toward enforcing security at runtime, we envision secure 2.5D system-level integration of untrusted chips and "all around" shielding for 3D ICs.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 42 publications
(50 reference statements)
0
3
0
Order By: Relevance
“…Still, in [202] it was shown recently that a lateral re-arrangement of the laser setup can suffice to enable such fault-injection attacks also for backside-protected 2D ICs and possibly also for 2.5D and 3D ICs. However, with a dedicated physical design of 3D ICs, e.g., placing TSVs densely at the chip boundaries, forming a "vertical shield" structure [178], along with regular shields in the BEOL and backside protection, even such attacks might remain difficult.…”
Section: Data Security At Runtime: Side-channel and Fault-injectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Still, in [202] it was shown recently that a lateral re-arrangement of the laser setup can suffice to enable such fault-injection attacks also for backside-protected 2D ICs and possibly also for 2.5D and 3D ICs. However, with a dedicated physical design of 3D ICs, e.g., placing TSVs densely at the chip boundaries, forming a "vertical shield" structure [178], along with regular shields in the BEOL and backside protection, even such attacks might remain difficult.…”
Section: Data Security At Runtime: Side-channel and Fault-injectionmentioning
confidence: 99%
“…In Table 1, I summarize selected works; I discuss these and others in some detail next. Note that other papers have reviewed the benefits and fallacies for hardware security arising by 3D and 2.5D integration as well, e.g., see [178][179][180].…”
Section: D and 25d Integrationmentioning
confidence: 99%
See 1 more Smart Citation