On Hardware Security and Trust for Chiplet-Based 2.5D and 3D ICs: Challenges and Innovations

Suzano Juan,Abouzeid Fady,Di Natale Giorgio,Philippe Anthony,Roche Philippe
DOI: https://doi.org/10.1109/access.2024.3368152
IF: 3.9
2024-03-02
IEEE Access
Abstract:The relentless pace of transistor miniaturization has enabled developers to continuously increase chip complexity since the beginning of the information age. However, as transistors get smaller and chips become larger, the cost of manufacturing ICs becomes increasingly prohibitive. As Moore's Law is coming to an end, industry and academia have been exploring new paradigms to keep up with the ever-increasing demand for performance and functionality while dealing with the constraints of power consumption, area, and yield constraints. In this context, 3DICs are considered the future of the IC industry as they enable designers to fulfill both the "More Moore" and the "More than Moore" paradigm. A key feature of the 3DIC is that it can be manufactured by assembling multiple chiplets. Chiplets are single-purpose dies that must be assembled with other chiplets to form a complete system. Researchers and industry leaders believe that a chiplet market will form and that products with off-the-shelf chiplets will emerge. This scenario offers many economic opportunities. However, it also raises concerns regarding the security and trust (S&T) of chiplet-based designs. Malicious chiplets, Hardware trojans, and chiplet intellectual property theft are threats that must be addressed as the industry moves towards the "chiplet age". In this survey, we introduce the different types of 3DICs and their production chain. We then define the threats that threaten the different steps of the 3DIC manufacturing process. Finally, we present and discuss the state of the art in hardware S&T techniques for chiplet-based 3DICs.
computer science, information systems,telecommunications,engineering, electrical & electronic
What problem does this paper attempt to address?
The paper primarily explores the application of chiplet technology in 2.5D and 3D integrated circuits (ICs), as well as the resulting hardware security and trust (S&T) issues. Specifically, the paper attempts to address the following key issues: 1. **Background and Challenges**: - As transistor sizes continue to shrink and chip scales continue to expand, manufacturing costs are increasing, and Moore's Law is reaching its limits. - Industry and academia are exploring new paradigms to meet the growing demands for performance and functionality while addressing constraints such as power consumption, area, and yield. - 2.5D and 3D integrated circuits are seen as the future direction of the IC industry, capable of achieving the concepts of "More Moore" and "Beyond Moore" by assembling multiple chiplets. 2. **Advantages of Chiplet Technology**: - Economic Advantages: Using chiplets can significantly reduce manufacturing costs and shorten time-to-market. - Functional Advantages: Different chiplets can be manufactured using the optimal technology node for their specific functions. - Connectivity Advantages: Connections between chiplets can be achieved through faster on-chip interconnects. - Power and Area Advantages: 3D stacking reduces data transmission distances, helping to lower power consumption and reduce the overall size of the chip. 3. **Security and Trust Threats**: - As the chiplet market forms and develops, hardware security and trust issues become particularly important. Threats such as malicious chiplets, hardware Trojans, and chiplet intellectual property theft need to be addressed. - The paper provides a detailed analysis of various threats that may arise during the design, manufacturing, and integration of chiplets and discusses how these threats can impact the security and integrity of hardware. 4. **Research Objectives**: - Investigate and discuss the current state and future directions of hardware security and trust in the context of chiplet technology. - Emphasize the importance of continuous exploration and innovation in hardware security and trust as the industry transitions to the chiplet era. In summary, this paper aims to comprehensively analyze the opportunities and challenges brought by chiplet technology, particularly in terms of hardware security and trust, and proposes some possible solutions and technological trends.