all InfoSec news
Coherence Attacks and Countermeasures in Interposer-Based Systems. (arXiv:2105.02917v2 [cs.AR] UPDATED)
Jan. 10, 2022, 2:20 a.m. | Gino Chacon, Tapojyoti Mandal, Johann Knechtel, Ozgur Sinanoglu, Paul Gratz, Vassos Soteriou
cs.CR updates on arXiv.org arxiv.org
Industry is moving towards large-scale systems where processor cores,
memories, accelerators, etc.\ are bundled via 2.5D integration. These various
components are fabricated separately as chiplets and then integrated using an
interconnect carrier, a so-called interposer. This new design style provides
benefits in terms of yield as well as economies of scale, as chiplets may come
from various third-party vendors, and be integrated into one sophisticated
system. The benefits of this approach, however, come at the cost of new
challenges for …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Systems Security Officer (ISSO) (Remote within HR Virginia area)
@ OneZero Solutions | Portsmouth, VA, USA
Security Analyst
@ UNDP | Tripoli (LBY), Libya
Senior Incident Response Consultant
@ Google | United Kingdom
Product Manager II, Threat Intelligence, Google Cloud
@ Google | Austin, TX, USA; Reston, VA, USA
Cloud Security Analyst
@ Cloud Peritus | Bengaluru, India