论文标题

2.5D信任的根源:不受信任的chiplet的安全系统级集成

2.5D Root of Trust: Secure System-Level Integration of Untrusted Chiplets

论文作者

Nabeel, Mohammed, Ashraf, Mohammed, Patnaik, Satwik, Soteriou, Vassos, Sinanoglu, Ozgur, Knechtel, Johann

论文摘要

在接受和出版后,专门纪念已故的Vassos Soteriou。我们首次利用2.5D插入器技术在面对以硬件和以软件为中心的对手的情况下建立系统级安全性。更具体地说,我们使用安全性化合物的插入器整合了chiplet(即复杂功能的第三方硬化知识特性,例如微处理器)。这样的硬件组织为可信赖,功能强大且灵活的计算系统提供了强大的2.5D信任根。我们计划的安全范例(通过设计和构造都牢固地采用)是:1)严格的物理分离不受信任的组件,以及2)运行时监控。所有不信任商品chiplet的系统级活动都通过物理分离的安全功能不断地针对安全策略进行检查。除了安全承诺外,外包供应链的良好经济学仍然维持;系统供应商可以自由地从公开市场中采购chiplet,而仅生产插入器并自己组装2.5D系统。我们使用手臂的Cortex-M0 Core和AHB-Lite Bus展示了我们的计划,建立了具有共同记忆的安全64核系统。我们通过硬件模拟考虑了不同的威胁场景来评估我们的计划。最后,我们根据商业级设计工具为2.5D系统设计了一个物理设计流,以演示和评估我们的2.5D信任根。

Dedicated, after acceptance and publication, in memory of the late Vassos Soteriou. For the first time, we leverage the 2.5D interposer technology to establish system-level security in the face of hardware- and software-centric adversaries. More specifically, we integrate chiplets (i.e., third-party hard intellectual property of complex functionality, like microprocessors) using a security-enforcing interposer. Such hardware organization provides a robust 2.5D root of trust for trustworthy, yet powerful and flexible, computation systems. The security paradigms for our scheme, employed firmly by design and construction, are: 1) stringent physical separation of trusted from untrusted components, and 2) runtime monitoring. The system-level activities of all untrusted commodity chiplets are checked continuously against security policies via physically separated security features. Aside from the security promises, the good economics of outsourced supply chains are still maintained; the system vendor is free to procure chiplets from the open market, while only producing the interposer and assembling the 2.5D system oneself. We showcase our scheme using the Cortex-M0 core and the AHB-Lite bus by ARM, building a secure 64-core system with shared memories. We evaluate our scheme through hardware simulation, considering different threat scenarios. Finally, we devise a physical-design flow for 2.5D systems, based on commercial-grade design tools, to demonstrate and evaluate our 2.5D root of trust.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源