An Interposer-Based Root of Trust: Seize the Opportunity for Secure System-Level Integration of Untrusted Chiplets

06/05/2019
by   Mohammed Nabeel, et al.
0

Leveraging 2.5D interposer technology, we advocate the integration of untrusted commodity components/chiplets with physically separate, entrusted logic components. Such organization provides a modern root of trust for secure system-level integration. We showcase our scheme by utilizing industrial ARM components that are interconnected via a security-providing active interposer, and thoroughly evaluate the achievable security via different threat scenarios. Finally, we provide detailed end-to-end physical design results to demonstrate the efficacy of our proposed methodology.

READ FULL TEXT

page 1

page 6

research
09/04/2020

2.5D Root of Trust: Secure System-Level Integration of Untrusted Chiplets

Dedicated, after acceptance and publication, in memory of the late Vasso...
research
05/06/2021

Interposer-Based Root of Trust

Industry is moving towards large-scale system-on-chip (SoC) designs wher...
research
04/04/2020

Building secure distributed applications the DECENT way

Remote attestation (RA) enables distributed applications that deploy tru...
research
02/13/2021

GAROTA: Generalized Active Root-Of-Trust Architecture

In this paper, we set out to systematically design a minimal active RoT ...
research
01/16/2019

Secure Cloud-Edge Deployments, with Trust

Assessing the security level of IoT applications to be deployed to heter...
research
10/21/2021

Certificate Root Stores: An Area of Unity or Disparity?

Organizations like Apple, Microsoft, Mozilla and Google maintain certifi...
research
02/02/2018

When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise

We propose a new formal criterion for secure compilation, giving strong ...

Please sign up or login with your details

Forgot password? Click here to reset