Abstract | ||
---|---|---|
The advent of hardware Trojans is posing an increasing threat on complex integrated circuits. Network-on-Chip, the established communication infrastructure for many core systems-on-chip, are growing in complexity. Integration of third-party components, which are increasingly becoming valuable targets, exposes the surface for attacks through the injection of hardware Trojans. In this paper, we address active attacks on NoCs, and focus on the integrity of transmitted data. Basically, we use network coding for the transmission of data in order to increase efficiency and robustness.
We introduce solutions that allow detection of active attacks under the consideration of the constraints in NoCs. The efficiency of these solutions is investigated by means of cycle-accurate simulations. Further, we develop an analytic approach for faster and more flexible but accurate evaluation. We finally analyze the area overhead using a state-of-the-art MPSoC and demonstrate that we can protect the integrity of data with reasonable effort.
|
Year | DOI | Venue |
---|---|---|
2018 | 10.1145/3194554.3194582 | ACM Great Lakes Symposium on VLSI |
Keywords | Field | DocType |
Hardware trojans, integrity, availability | Linear network coding,Computer science,Real-time computing,Robustness (computer science),Integrated circuit,MPSoC,Embedded system | Conference |
ISSN | ISBN | Citations |
1066-1395 | 978-1-4503-5724-1 | 0 |
PageRank | References | Authors |
0.34 | 14 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sadia Moriam | 1 | 10 | 3.30 |
Elke Franz | 2 | 113 | 54.42 |
Paul Walther | 3 | 0 | 0.68 |
A. Kumar | 4 | 936 | 93.04 |
Thorsten Strufe | 5 | 846 | 80.61 |
G. Fettweis | 6 | 1204 | 125.16 |