{"id":"https://openalex.org/W4411173210","doi":"https://doi.org/10.1109/vts65138.2025.11022850","title":"Garblet: Multi-party Computation for Protecting Chiplet-based Systems","display_name":"Garblet: Multi-party Computation for Protecting Chiplet-based Systems","publication_year":2025,"publication_date":"2025-04-28","ids":{"openalex":"https://openalex.org/W4411173210","doi":"https://doi.org/10.1109/vts65138.2025.11022850"},"language":"en","primary_location":{"id":"doi:10.1109/vts65138.2025.11022850","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vts65138.2025.11022850","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 43rd VLSI Test Symposium (VTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076826149","display_name":"Mohammad Hashemi","orcid":"https://orcid.org/0000-0002-1216-1552"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohammad Hashemi","raw_affiliation_strings":["Worcester Polytechnic Institute,Worcester,MA,USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute,Worcester,MA,USA","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002624062","display_name":"Shahin Tajik","orcid":"https://orcid.org/0000-0003-3752-2358"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shahin Tajik","raw_affiliation_strings":["Worcester Polytechnic Institute,Worcester,MA,USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute,Worcester,MA,USA","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017195195","display_name":"Fatemeh Ganji","orcid":"https://orcid.org/0000-0003-0151-1307"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fatemeh Ganji","raw_affiliation_strings":["Worcester Polytechnic Institute,Worcester,MA,USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute,Worcester,MA,USA","institution_ids":["https://openalex.org/I107077323"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076826149"],"corresponding_institution_ids":["https://openalex.org/I107077323"],"apc_list":null,"apc_paid":null,"fwci":2.8599,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91296802,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7223533987998962},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5493242740631104},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43049195408821106},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1391649842262268}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7223533987998962},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5493242740631104},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43049195408821106},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1391649842262268}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vts65138.2025.11022850","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vts65138.2025.11022850","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 43rd VLSI Test Symposium (VTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1493343761","https://openalex.org/W1987434335","https://openalex.org/W2007113317","https://openalex.org/W2016443801","https://openalex.org/W2072922074","https://openalex.org/W2170696315","https://openalex.org/W2534976269","https://openalex.org/W2929650703","https://openalex.org/W2942224063","https://openalex.org/W2951369070","https://openalex.org/W4313157449","https://openalex.org/W4392249495","https://openalex.org/W6762270585"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0],"introduction":[1],"of":[2,72,99,157,167,180],"shared":[3,17,40],"computation":[4,39,67,112,182],"architectures":[5],"assembled":[6],"from":[7],"heterogeneous":[8],"chiplets":[9,35,146],"introduces":[10],"new":[11],"security":[12,177],"threats.":[13],"Due":[14],"to":[15,28,50,63,147,174],"the":[16,31,38,47,52,70,97,155,164,176,181],"logical":[18],"and":[19,58,86,101,110,124,178],"physical":[20],"resources,":[21],"an":[22,87,119],"untrusted":[23],"chiplet":[24,56,158],"can":[25],"act":[26],"maliciously":[27],"surreptitiously":[29],"probe":[30],"data":[32],"communication":[33,108],"between":[34,41],"or":[36],"sense":[37],"them.":[42],"This":[43,94],"paper":[44],"presents":[45],"Garblet,":[46],"first":[48],"framework":[49,117],"leverage":[51],"flexibility":[53],"offered":[54],"by":[55],"technology":[57],"Garbled":[59],"Circuits":[60],"(GC)-based":[61],"MPC":[62],"enable":[64],"efficient,":[65],"secure":[66],"even":[68],"in":[69,172],"presence":[71],"potentially":[73],"compromised":[74],"chiplets.":[75,184],"Our":[76,152],"approach":[77],"integrates":[78],"a":[79,134],"customized":[80],"hardware":[81],"Oblivious":[82],"Transfer":[83],"(OT)":[84],"module":[85,123],"optimized":[88],"evaluator":[89],"engine":[90],"into":[91],"chiplet-based":[92],"platforms.":[93],"configuration":[95],"distributes":[96],"tasks":[98],"garbling":[100],"evaluating":[102],"circuits":[103],"across":[104,144],"two":[105],"chiplets,":[106],"reducing":[107],"costs":[109],"enhancing":[111],"speed.":[113],"We":[114],"implement":[115],"this":[116],"on":[118,183],"AMD/Xilinx":[120],"UltraScale+":[121],"multichip":[122],"demonstrate":[125],"its":[126],"effectiveness":[127],"using":[128],"benchmark":[129],"functions.":[130],"Additionally,":[131],"we":[132],"introduce":[133],"novel":[135],"circuit":[136],"decomposition":[137],"technique":[138],"that":[139],"allows":[140],"for":[141,160],"parallel":[142],"processing":[143],"multiple":[145],"improve":[148],"computational":[149],"efficiency":[150],"further.":[151],"results":[153],"highlight":[154],"potential":[156],"systems":[159],"accelerating":[161],"GC":[162],"(e.g.,":[163],"time":[165],"complexity":[166],"garbled":[168],"AES":[169],"is":[170],"0.0226ms)":[171],"order":[173],"guarantee":[175],"privacy":[179]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
