{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T21:47:48Z","timestamp":1759960068627,"version":"3.43.0"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"5","funder":[{"name":"VE-Jupiter","award":["16ME0234"],"award-info":[{"award-number":["16ME0234"]}]},{"name":"German Ministry of Education and Research"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Des. Autom. Electron. Syst."],"published-print":{"date-parts":[[2025,9,30]]},"abstract":"<jats:p>\n            System in Package (SiP) relies on integrating different chiplets potentially involving many third-party devices and chiplet foundries. This type of advanced packaging technology opens up numerous threat scenarios, especially: (a) the inauthentic and untraceable integration of chiplets into a SiP, (b) the insecure integration of malicious chiplets, which leads to a severe impact on the SiP security in the field. The current solutions require many hardware cryptographic primitives, making them costly and power-hungry. Therefore, a new lightweight solution is needed to ensure secure chiplet integration and secure SiP operation. In this article, we deal with these problems and introduce\n            <jats:italic toggle=\"yes\">iTrustlet<\/jats:italic>\n            , as a combination of a physical unclonable function and an authenticated encryption scheme to ensure an authenticated and traceable chiplet integration. We propose a chiplet integration protocol based on\n            <jats:italic toggle=\"yes\">iTrustlet<\/jats:italic>\n            and a classical root-of-trust (RoT) to ensure the integrated chiplets are unaltered and unreplaced. To guarantee SiP in-field security,\n            <jats:italic toggle=\"yes\">iTrustlet<\/jats:italic>\n            with a hardware firewall (HWF) is proposed. Their interaction leads to two security features: (i) HWF provides a SiP protection mechanism, and (ii)\n            <jats:italic toggle=\"yes\">iTrustlet<\/jats:italic>\n            secures the update of HWF rules. In particular, we provide a multilevel solution centralized around\n            <jats:italic toggle=\"yes\">iTrustlet<\/jats:italic>\n            , focusing on lightweightness. The implementation results show that area and power overheads are 1.24% and 1.84% in the case of FPGA and 0.49% and 1.2% for ASIC implementation.\n          <\/jats:p>","DOI":"10.1145\/3745780","type":"journal-article","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T07:39:24Z","timestamp":1750837164000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight Authenticated Integration and In-Field Secure Operation of System-in-Package"],"prefix":"10.1145","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-4820-4726","authenticated-orcid":false,"given":"Christian","family":"Ewert","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, University of Luebeck","place":["Lubeck, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5031-2430","authenticated-orcid":false,"given":"Andrija","family":"Neskovic","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Luebeck","place":["Lubeck, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5927-4426","authenticated-orcid":false,"given":"Carsten","family":"Heinz","sequence":"additional","affiliation":[{"name":"Embedded Systems and Applications Group, TU Darmstadt","place":["Darmstadt, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3439-0092","authenticated-orcid":false,"given":"Felix","family":"Muuss","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Luebeck","place":["Lubeck, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4779-5484","authenticated-orcid":false,"given":"Alexander","family":"Treff","sequence":"additional","affiliation":[{"name":"Institute for IT Security, University of Luebeck","place":["Luebeck, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2580-801X","authenticated-orcid":false,"given":"Marc","family":"Gourjon","sequence":"additional","affiliation":[{"name":"NXP Semiconductors Germany GmbH","place":["Hamburg, Germany"]},{"name":"Max Planck Institute for Security and Privacy","place":["Hamburg, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9413-2078","authenticated-orcid":false,"given":"Rainer","family":"Buchty","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Luebeck","place":["Lubeck, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1116-6973","authenticated-orcid":false,"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[{"name":"Institute for IT Security, University of Luebeck","place":["Luebeck, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9859-4956","authenticated-orcid":false,"given":"Andreas","family":"Koch","sequence":"additional","affiliation":[{"name":"Embedded Systems and Applications Group, TU Darmstadt","place":["Darmstadt, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1911-756X","authenticated-orcid":false,"given":"Mladen","family":"Berekovic","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Luebeck","place":["Lubeck, Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7380-5270","authenticated-orcid":false,"given":"Saleh","family":"Mulhem","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Luebeck","place":["Lubeck, Germany"]}]}],"member":"320","published-online":{"date-parts":[[2025,8,12]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"2023. FACTORY INTEGRATION THE INTERNATIONAL ROADMAP FOR DEVICES AND SYSTEMS. Retrieved May 19 2024 from https:\/\/irds.ieee.org\/images\/files\/pdf\/2023\/2023IRDS_FAC.pdf"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473510"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14452-3_6"},{"key":"e_1_3_1_5_2","unstructured":"Semiconductor Industry Association. 2015. 2015 International Technology Roadmap for Semiconductors (ITRS). Retrieved May 19 2024 from https:\/\/www.semiconductors.org\/resources\/2015-international-technology-roadmap-for-semiconductors-itrs\/"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2022.3187810"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2931481"},{"key":"e_1_3_1_8_2","unstructured":"Olivier Jean Benoit and Vincent Pierre Le Roy. 2016. U.S. Patent US20170329538A1 2016. Fuse-based anti-replay mechanism."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_11"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28496-0_19"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.083"},{"key":"e_1_3_1_12_2","first-page":"1","volume-title":"Proceedings of the 2014 Design, Automation and Test in Europe Conference and Exhibition (DATE)","author":"Bhargava Mudit","year":"2014","unstructured":"Mudit Bhargava and Ken Mai. 2014. An efficient reliable PUF-based cryptographic key generator in 65nm CMOS. In Proceedings of the 2014 Design, Automation and Test in Europe Conference and Exhibition (DATE). IEEE, 1\u20136."},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-024-01126-y"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818186"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09398-9"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2016.7835570"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865541"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-42921-7_22"},{"key":"e_1_3_1_19_2","unstructured":"Bertoni Guido Daemen Joan P. Micha\u00ebl and V. A. Gilles. 2011. Cryptographic sponge functions. Retrieved October 27 2023 from https:\/\/keccak.team\/files\/CSF-0.1.pdf"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-46077-7_19"},{"key":"e_1_3_1_21_2","volume-title":"White Paper: Protecting the IoT with Invisible Keys","author":"ID Intrinsic","year":"2021","unstructured":"Intrinsic ID. 2021. White Paper: Protecting the IoT with Invisible Keys. Technical Report. Intrinsic ID Inc., 710 Lakeway Drive, Sunnyvale, CA 94085 U.S. Retrieved from https:\/\/data.embeddedcomputing.com\/uploads\/articles\/whitepapers\/14492.pdf"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3147201"},{"key":"e_1_3_1_23_2","first-page":"10","volume-title":"Proceedings of the Hot Chips: A Symposium on High Performance Chips","author":"Johnson Scott","year":"2018","unstructured":"Scott Johnson, Dominic Rizzo, Parthasarathy Ranganathan, Jon McCune, and Richard Ho. 2018. Titan: Enabling a transparent silicon root of trust for cloud. In Proceedings of the Hot Chips: A Symposium on High Performance Chips. 10."},{"key":"e_1_3_1_24_2","first-page":"284","volume-title":"Proceedings of the International Workshop on Fast Software Encryption","author":"Katz Jonathan","year":"2000","unstructured":"Jonathan Katz and Moti Yung. 2000. Unforgeable encryption and chosen ciphertext secure modes of operation. In Proceedings of the International Workshop on Fast Software Encryption. Springer, 284\u2013299."},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062293"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23165-5_19"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ECTC.2014.6897513"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","unstructured":"Johan Marconot David Hely and Florian Pebay-Peyroula. 2020. Conception and evaluation of secure circuits for strong digital PUF. SN Computer Science 1 5 (08 2020) 1\u201317. 10.1007\/s42979-020-00274-0","DOI":"10.1007\/s42979-020-00274-0"},{"issue":"5","key":"e_1_3_1_30_2","first-page":"927","article-title":"SD-PUF: Spliced digital physical unclonable function","volume":"37","author":"Miao Jin","year":"2017","unstructured":"Jin Miao, Meng Li, Subhendu Roy, Yuzhe Ma, and Bei Yu. 2017. SD-PUF: Spliced digital physical unclonable function. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37, 5 (2017), 927\u2013940.","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3020777"},{"key":"e_1_3_1_32_2","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.FIPS.202","volume-title":"SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions","author":"Technology National Institute of Standards and","year":"2015","unstructured":"National Institute of Standards and Technology. 2015. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. Federal Information Processing Standards Publication FIPS PUB 202. National Institute of Standards and Technology. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.202.pdf"},{"key":"e_1_3_1_33_2","unstructured":"NewAE. 2023. CW310 Bergen Board. Retrieved October 31 2023 from https:\/\/rtfm.newae.com\/Targets\/CW310%20Bergen%20Board\/"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2013.2252317"},{"key":"e_1_3_1_35_2","unstructured":"Rouhan Noor Himanandhan Reddy Kottur Patrick J. Craig Liton Kumar Biswas M. Shafkat M. Khan Nitin Varshney Hamed Dalir Elif Ak\u00e7al\u0131 Bahareh Ghane Motlagh Charles Woychik Yong-Kyu Yoon and Navid Asadizanjani. 2023. US microelectronics packaging ecosystem: challenges and opportunities. arXiv:2310.11651 [eess.SY]. Retrieved July 01 2025 from https:\/\/arxiv.org\/abs\/2310.11651"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/DCAS57389.2023.10130190"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","unstructured":"Enkele Rama Mouadh Ayache Rainer Buchty Bernhard Bauer Matthias Korb Mladen Berekovic and Saleh Mulhem. 2024. Trustworthy integrated circuits: From safety to security and beyond. IEEE Access 12 (2024) 69603\u201369632. 10.1109\/ACCESS.2024.3400685","DOI":"10.1109\/ACCESS.2024.3400685"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2749226"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2023.3270234"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3375874"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/S3S.2018.8640145"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2019.0061"},{"key":"e_1_3_1_44_2","unstructured":"IEEE Electronics Packaging Society. 2022. Heterogeneous Integration Roadmap 2021 Edition Chapter 21: SiP and Module System Integration. Retrieved September 25 2023 from https:\/\/eps.ieee.org\/images\/files\/HIR_2021\/ch21_sip-module.pdf"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"e_1_3_1_46_2","unstructured":"uciexpress.org. 2022. Universal Chiplet Interconnect Express (UCIe) Specification Rev 1.1. Retrieved July 18 2024 from https:\/\/www.uciexpress.org\/specifications"},{"key":"e_1_3_1_47_2","unstructured":"Nidish Vashistha Md Latifur Rahman Md Saad Ul Haque Azim Uddin Md Sami Ul Islam Sami Amit Mazumder Shuo Paul Calzada Farimah Farahmandi Navid Asadizanjani Fahim Rahman and Mark Tehranipoor. 2022. ToSHI - Towards Secure Heterogeneous Integration: Security Risks Threat Assessment and Assurance. Cryptology ePrint Archive Paper 2022\/984. Retrieved October 06 2023 from https:\/\/eprint.iacr.org\/2022\/984"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2729398"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.3390\/mi14061149"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050672"},{"key":"e_1_3_1_51_2","article-title":"On foundation and construction of physical unclonable functions","author":"Wu Jiang","year":"2010","unstructured":"Jiang Wu and Maire O\u2019Neill. 2010. On foundation and construction of physical unclonable functions. Cryptology ePrint Archive (2010).","journal-title":"Cryptology ePrint Archive"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.121"},{"key":"e_1_3_1_53_2","unstructured":"Xilinx. 2018. ZCU104 Evaluation Board User Guide. Retrieved October 31 2023 from https:\/\/docs.xilinx.com\/v\/u\/en-US\/ug1267-zcu104-eval-bd"},{"key":"e_1_3_1_54_2","doi-asserted-by":"crossref","unstructured":"Tao Zhang Md Latifur Rahman Hadi Mardani Kamali Kimia Zamiri Azar and Farimah Farahmandi. 2023. SiPGuard: Run-time system-in-package security monitoring via power noise variation. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 32 2 (2023) 305\u2013318.","DOI":"10.1109\/TVLSI.2023.3322384"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","unstructured":"Xiaowu Zhang Jong Kai Lin Sunil Wickramanayaka Songbai Zhang Roshan Weerasekera Rahul Dutta Ka Fai Chang King-Jien Chui Hong Yu Li David Soon Wee Ho and others. 2015. Heterogeneous 2.5D integration on through silicon interposer. Applied Physics Reviews 2 2 (2015). DOI:10.1063\/1.4921463","DOI":"10.1063\/1.4921463"}],"container-title":["ACM Transactions on Design Automation of Electronic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3745780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T13:16:08Z","timestamp":1755004568000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3745780"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,12]]},"references-count":54,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9,30]]}},"alternative-id":["10.1145\/3745780"],"URL":"https:\/\/doi.org\/10.1145\/3745780","relation":{},"ISSN":["1084-4309","1557-7309"],"issn-type":[{"type":"print","value":"1084-4309"},{"type":"electronic","value":"1557-7309"}],"subject":[],"published":{"date-parts":[[2025,8,12]]},"assertion":[{"value":"2024-07-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}