论文标题

基于插头的芯片集成的安全评估

Security Assessment of Interposer-based Chiplet Integration

论文作者

Shayan, Mohammed, Basu, Kanad, Karri, Ramesh

论文摘要

随着晶体管缩放达到其限制,基于插孔的模具(chiplets)的整合正在获得吸引力。这种基于插入器的集成比传统的系统包装可以实现更精细的互连音高,并提供了两个关键的好处:1。通过绕过时间耗时的验证和制造过程,它可以减少设计到市场的时间。 2。它通过重复使用chiplets来降低设计成本。尽管慢速设计阶段的黑色盒子缩短了设计时间,但它引起了重大的安全问题。我们研究了新兴插入器的集成方法的安全含义。黑框的设计阶段在传统的芯片系统(SOC)设计中针对硬件木马,反向工程和知识产权盗版部署安全措施,因此不适合基于插入器的集成。我们建议使用功能多样化的芯片来检测和挫败硬件特洛伊木马,并使用固有的逻辑冗余来掩盖反海盗措施。我们的建议不依赖于对黑框设计阶段的访问。我们通过在基于Interposer的Xilinx FPGA上实现MIPS处理器,DCT核心和AES核心来评估计划的安全性,时间和成本优势。

With transistor scaling reaching its limits, interposer-based integration of dies (chiplets) is gaining traction. Such an interposer-based integration enables finer and tighter interconnect pitch than traditional system-on-packages and offers two key benefits: 1. It reduces design-to-market time by bypassing the time-consuming process of verification and fabrication. 2. It reduces the design cost by reusing chiplets. While black-boxing of the slow design stages cuts down the design time, it raises significant security concerns. We study the security implications of the emerging interposer-based integration methodology. The black-boxed design stages deploy security measures against hardware Trojans, reverse engineering, and intellectual property piracy in traditional systems-on-chip (SoC) designs and hence are not suitable for interposer-based integration. We propose using functionally diverse chiplets to detect and thwart hardware Trojans and use the inherent logic redundancy to shore up anti-piracy measures. Our proposals do not rely on access to the black-box design stages. We evaluate the security, time and cost benefits of our plan by implementing a MIPS processor, a DCT core, and an AES core using various IPs from the Xilinx CORE GENERATOR IP catalog, on an interposer-based Xilinx FPGA.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源