2.5D Root of Trust: Secure System-Level Integration of Untrusted Chiplets

09/04/2020
by   Mohammed Nabeel, et al.
0

Dedicated, after acceptance and publication, in memory of the late Vassos Soteriou. For the first time, we leverage the 2.5D interposer technology to establish system-level security in the face of hardware- and software-centric adversaries. More specifically, we integrate chiplets (i.e., third-party hard intellectual property of complex functionality, like microprocessors) using a security-enforcing interposer. Such hardware organization provides a robust 2.5D root of trust for trustworthy, yet powerful and flexible, computation systems. The security paradigms for our scheme, employed firmly by design and construction, are: 1) stringent physical separation of trusted from untrusted components, and 2) runtime monitoring. The system-level activities of all untrusted commodity chiplets are checked continuously against security policies via physically separated security features. Aside from the security promises, the good economics of outsourced supply chains are still maintained; the system vendor is free to procure chiplets from the open market, while only producing the interposer and assembling the 2.5D system oneself. We showcase our scheme using the Cortex-M0 core and the AHB-Lite bus by ARM, building a secure 64-core system with shared memories. We evaluate our scheme through hardware simulation, considering different threat scenarios. Finally, we devise a physical-design flow for 2.5D systems, based on commercial-grade design tools, to demonstrate and evaluate our 2.5D root of trust.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 4

page 8

page 12

page 15

06/05/2019

An Interposer-Based Root of Trust: Seize the Opportunity for Secure System-Level Integration of Untrusted Chiplets

Leveraging 2.5D interposer technology, we advocate the integration of un...
06/06/2019

3D Integration: Another Dimension Toward Hardware Security

We review threats and selected schemes concerning hardware security at d...
05/06/2021

Interposer-Based Root of Trust

Industry is moving towards large-scale system-on-chip (SoC) designs wher...
02/13/2021

GAROTA: Generalized Active Root-Of-Trust Architecture

In this paper, we set out to systematically design a minimal active RoT ...
05/20/2019

simTPM: User-centric TPM for Mobile Devices (Technical Report)

Trusted Platform Modules are valuable building blocks for security solut...
05/11/2019

Artificial Consciousness and Security

This paper describes a possible way to improve computer security by impl...
10/21/2021

Certificate Root Stores: An Area of Unity or Disparity?

Organizations like Apple, Microsoft, Mozilla and Google maintain certifi...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.