3-D Extensions for Trustworthy Systems
dc.contributor.author | Huffmire, Ted | |
dc.contributor.author | Levin, Timothy | |
dc.contributor.author | Irvine, Cynthia | |
dc.contributor.author | Kastner, Ryan | |
dc.contributor.author | Sherwood, Timothy | |
dc.contributor.department | Computer Science (CS) | |
dc.date | 2011 | |
dc.date.accessioned | 2013-08-08T18:22:52Z | |
dc.date.available | 2013-08-08T18:22:52Z | |
dc.date.issued | 2011 | |
dc.description.abstract | Trustworthy system development entails a high nonrecurring engineering (NRE) cost together with a low volume of units over which to amortize that cost. For example, the potential for developmental and operational attacks against hardware requires countermeasures that make it very expensive to design and manufacture custom hardware used to build high assurance systems. To address these problems, we propose an approach to trustworthy system development based on 3-D integration, an emerging chip fabrication technique in which two or more integrated circuit dies are fabricated individually and then combined into a single stack using vertical conductive posts. With 3-D integration, a generalpurpose die, or computation plane, can be combined with a special-purpose die, or control plane. We discuss the security advantages of using 3-D integrated hardware in sensitive applications, where security is of the utmost importance, and we outline problems, challenges, attacks, solutions, and topics for future research. | en_US |
dc.identifier.uri | https://hdl.handle.net/10945/35008 | |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.title | 3-D Extensions for Trustworthy Systems | en_US |
dspace.entity.type | Publication |
Files
Original bundle
1 - 1 of 1