2016
DOI: 10.1109/tmscs.2016.2550460
|View full text |Cite
|
Sign up to set email alerts
|

Security and Vulnerability Implications of 3D ICs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 48 publications
(13 citation statements)
references
References 94 publications
0
13
0
Order By: Relevance
“…To address and manage this challenge of verification and other security-centric challenges, the notions of "secure by design" and "design-for-trust" have been promoted for some years now for "regular" 2D chips [116], [117], [118], [119], [123], [124], [125], [126], [127], [128]. Similar studies are recently focusing on 3D chips as well [129], [130], [131], [132], [133], [134], [135], [136], [137], [138]. Note that early stud- Fig.…”
Section: Towards Trustworthy 3d Integrationmentioning
confidence: 99%
See 1 more Smart Citation
“…To address and manage this challenge of verification and other security-centric challenges, the notions of "secure by design" and "design-for-trust" have been promoted for some years now for "regular" 2D chips [116], [117], [118], [119], [123], [124], [125], [126], [127], [128]. Similar studies are recently focusing on 3D chips as well [129], [130], [131], [132], [133], [134], [135], [136], [137], [138]. Note that early stud- Fig.…”
Section: Towards Trustworthy 3d Integrationmentioning
confidence: 99%
“…As indicated, this is especially attractive for 3D chips where such monitors can be implemented in trustworthy dies, separated from the potentially Trojaninfected legacy chips [127], [129], [130], [139]. Nevertheless, some Trojans may be crafted specifically for 3D integration and end up being "buried somewhere in the midst of the 3D chip"; they are harder to detect during runtime [134], and may also exploit distinct trigger mechanisms such as increased internal heating [154].…”
Section: Detection Of Hardware Trojansmentioning
confidence: 99%
“…Three-dimensional integration also introduces security vulnerability opportunities. This includes side channel analysis attack prevention, trusted computing design, and the prohibition of supply-chain-based attacks [112]. For instance, the dimensions of an integrated circuit containing many dies from different sellers are not secure because not all of the IP providers follow a similar level of die certification.…”
Section: Split Manufacturingmentioning
confidence: 99%
“…Since clock synthesis is usually performed after cell placement, layout whitespace for TSVs is limited. However, both TSVs (clock and control) occupy a large placement area and the reliability [Jung et al 2012;Xie et al 2016] and signal integrity [Liu et al 2011] requirements enforce TSVs to maintain certain keep-out areas, both of which constrain the usage of TSVs. In addition, although TSVs offer short and fast vertical connections, excessive usage of TSVs increases the manufacturing overhead and makes the system's reliability questionable, due to the degradation of TSVs over time.…”
Section: Introductionmentioning
confidence: 99%