Interposer-Based Root of Trust

05/06/2021
by   Tapojyoti Mandal, et al.
0

Industry is moving towards large-scale system-on-chip (SoC) designs where heterogeneous components such as processor cores, DSPs, memory controllers, and accelerator units are bundled via 2.5D integration. That is, these components are fabricated separately onto chiplets and then integrated using an interconnect carrier, a so-called interposer. Independently, however, general-purpose SoC architectures have raised significant security concerns. Therefore, with many IP modules and hardware components coming from various third-party vendors and manufacturers, ensuring security and integrity of chiplets-based system is a grand challenge. Further, malicious software running within a chiplet can pose significant risks as well. In this work, we propose to leverage an active interposer as secure-by-construction, generic root of trust platform for such modern systems. Our work presents a new architectural framework where untrusted processing elements, running untrusted code, are integrated on top of such an interposer-based root of trust, allowing us to detect and prevent any form of malicious messages exchanged between the heterogeneous components. Our technique has limited design overhead that is furthermore restricted to the active interposer, allowing the heterogeneous components within chiplets to remain untouched. We show that our scheme correctly handles attempted security violations with little impact on system performance, around 4

READ FULL TEXT

page 1

page 2

page 10

page 11

research
09/26/2022

TrustToken, a Trusted SoC solution for Non-Trusted Intellectual Property (IP)s

Secure and trustworthy execution in heterogeneous SoCs is a major priori...
research
06/05/2019

An Interposer-Based Root of Trust: Seize the Opportunity for Secure System-Level Integration of Untrusted Chiplets

Leveraging 2.5D interposer technology, we advocate the integration of un...
research
03/29/2023

Cyber Security aboard Micro Aerial Vehicles: An OpenTitan-based Visual Communication Use Case

Autonomous Micro Aerial Vehicles (MAVs), with a form factor of 10cm in d...
research
09/04/2020

2.5D Root of Trust: Secure System-Level Integration of Untrusted Chiplets

Dedicated, after acceptance and publication, in memory of the late Vasso...
research
02/13/2023

Lightweight Encryption and Anonymous Routing in NoC based SoCs

Advances in manufacturing technologies have enabled System-on-Chip (SoC)...
research
05/13/2018

Shattered Trust: When Replacement Smartphone Components Attack

Phone touchscreens, and other similar hardware components such as orient...
research
12/02/2019

Securing Soft IP Cores in FPGA based Reconfigurable Mobile Heterogeneous Systems

The mobile application market is rapidly growing and changing, offering ...

Please sign up or login with your details

Forgot password? Click here to reset