Back to Search
Start Over
Security and Vulnerability Implications of 3D ICs
- Source :
- IEEE Transactions on Multi-Scale Computing Systems. 2:108-122
- Publication Year :
- 2016
- Publisher :
- Institute of Electrical and Electronics Engineers (IEEE), 2016.
-
Abstract
- Physical limit of transistor miniaturization has driven chip design into the third dimension. 3D integration technology emerges as a viable option to improve chip performance and increase device density in a direction orthogonal to costly device scaling. As 3D integration is becoming a promising technology for next-generation chip design, recent years have seen a huge proliferation of research literature exploiting it from a security perspective. This paper presents a survey on the current state of 3D integration technology from a security perspective and summarizes its security opportunities and challenges. We report current research work on 3D integration based security in three major applications: supply chain attack prevention, side-channel attack mitigation, and trustworthy computing system design. The security advantages and opportunities of 3D integration in these security applications are highlighted. Besides, the paper discusses new vulnerabilities risen by 3D integration that require researchers’ attention. Based on the survey result, we summarize the distinct characteristics of 3D ICs and investigate their impacts on security-aware 3D IC designs.
- Subjects :
- 010302 applied physics
Hardware security module
Engineering
business.industry
Vulnerability
Three-dimensional integrated circuit
Supply chain attack
02 engineering and technology
Computer security
computer.software_genre
01 natural sciences
020202 computer hardware & architecture
Trustworthy computing
Hardware and Architecture
Control and Systems Engineering
Hardware Trojan
0103 physical sciences
0202 electrical engineering, electronic engineering, information engineering
Systems design
Side channel attack
business
computer
Information Systems
Subjects
Details
- ISSN :
- 23327766
- Volume :
- 2
- Database :
- OpenAIRE
- Journal :
- IEEE Transactions on Multi-Scale Computing Systems
- Accession number :
- edsair.doi...........27c7693c64a1526c1c9d623e3e58f339
- Full Text :
- https://doi.org/10.1109/tmscs.2016.2550460