A 3-D split manufacturing approach to trustworthy system development
MetadataShow full item record
Securing the supply chain of integrated circuits is of utmost importance to computer security. In addition to counterfeit microelectronics, the theft or malicious modification of designs in the foundry can result in catastrophic damage to critical systems and large projects. In this letter, we describe a 3-D architecture that splits a design into two separate tiers: one tier that contains critical security functions is manufactured in a trusted foundry; another tier is manufactured in an unsecured foundry. We argue that a split manufacturing approach to hardware trust based on 3-D integration is viable and provides several advantages over other approaches.
The article of record as published may be found at http://dx.doi.org/10.1109/TCAD.2012.2227257
Showing items related by title, author, creator and subject.
Investigation of the possibility of providing no-break electric power using a gas turbine as the emergency prime mover Borberg, James R. (Rensselaer Polytechnic Institute, 1963-05);The specific problem in this investigation is to determine if a no-break electric power system using a gas turbine as the emergency prime mover can be manufactured and operated within certain specified limits to provide ...
Cost benefit analysis of government furnished equipment versus contract furnished equipment for the procurement and integration of the MK-44 chain gun with the United States Marine Corps Expeditionary Fighting Vehicle Howard, James E.; Collins, Patrick B. (Monterey, California: Naval Postgraduate School, 2005-03);The Direct Reporting Program Manager (DRPM) for the USMC's Expeditionary Fighting Vehicle (EFV) is conducting an analysis of two acquisition tactics concerning the commercial procurement of the MK-44 to be integrated with ...
Valamehr, Jonathan; Sherwood, Timothy; Kastner, Ryan; Marangoni-Simonsen, David; Huffmire, Ted; Irvine, Cynthia; Levin, Timothy (Monterey, California. Naval Postgraduate School, 2012-12-01); NPS-CS-12-004Securing the supply chain of integrated circuits is of the utmost importance to computer security. In addition to counterfeit microelectronics, the theft or malicious modification of designs in the foundry can result in ...