Visible to the public Routing Aware and Runtime Detection for Infected Network-on-Chip Routers

TitleRouting Aware and Runtime Detection for Infected Network-on-Chip Routers
Publication TypeConference Paper
Year of Publication2018
AuthorsDaoud, Luka, Rafla, Nader
Conference Name2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS)
PublisherIEEE
ISBN Number978-1-5386-7392-8
KeywordsHardware, hardware trojan, integrated circuits, invasive software, logic design, malicious Hardware Trojans, Malicious-tolerant Routing Algorithm, Metrics, MPSoC, multiprocessing systems, Multiprocessors System-on-Chip, network on chip security, network routing, network-on-chip, network-on-chip architecture, NoC, outsourcing, pubcrawl, resilience, Resiliency, Router Systems Security, Routing, Runtime, runtime detection, secret key leaking, secure routing algorithm, security, security attacks, System recovery, system-on-chip, Trojan horses
Abstract

Network-on-Chip (NoC) architecture is the communication heart of the processing cores in Multiprocessors System-on-Chip (MPSoC), where messages are routed from a source to a destination through intermediate nodes. Therefore, NoC has become a target to security attacks. By experiencing outsourcing design, NoC can be infected with a malicious Hardware Trojans (HTs) which potentially degrade the system performance or leave a backdoor for secret key leaking. In this paper, we propose a HT model that applies a denial of service attack by misrouting the packets, which causes deadlock and consequently degrading the NoC performance. We present a secure routing algorithm that provides a runtime HT detection and avoiding scheme. Results show that our proposed model has negligible overhead in area and power, 0.4% and 0.6%, respectively.

URLhttps://ieeexplore.ieee.org/document/8623972
DOI10.1109/MWSCAS.2018.8623972
Citation Keydaoud_routing_2018