Routing Aware and Runtime Detection for Infected Network-on-Chip Routers
Title | Routing Aware and Runtime Detection for Infected Network-on-Chip Routers |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Daoud, Luka, Rafla, Nader |
Conference Name | 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS) |
Publisher | IEEE |
ISBN Number | 978-1-5386-7392-8 |
Keywords | Hardware, hardware trojan, integrated circuits, invasive software, logic design, malicious Hardware Trojans, Malicious-tolerant Routing Algorithm, Metrics, MPSoC, multiprocessing systems, Multiprocessors System-on-Chip, network on chip security, network routing, network-on-chip, network-on-chip architecture, NoC, outsourcing, pubcrawl, resilience, Resiliency, Router Systems Security, Routing, Runtime, runtime detection, secret key leaking, secure routing algorithm, security, security attacks, System recovery, system-on-chip, Trojan horses |
Abstract | Network-on-Chip (NoC) architecture is the communication heart of the processing cores in Multiprocessors System-on-Chip (MPSoC), where messages are routed from a source to a destination through intermediate nodes. Therefore, NoC has become a target to security attacks. By experiencing outsourcing design, NoC can be infected with a malicious Hardware Trojans (HTs) which potentially degrade the system performance or leave a backdoor for secret key leaking. In this paper, we propose a HT model that applies a denial of service attack by misrouting the packets, which causes deadlock and consequently degrading the NoC performance. We present a secure routing algorithm that provides a runtime HT detection and avoiding scheme. Results show that our proposed model has negligible overhead in area and power, 0.4% and 0.6%, respectively. |
URL | https://ieeexplore.ieee.org/document/8623972 |
DOI | 10.1109/MWSCAS.2018.8623972 |
Citation Key | daoud_routing_2018 |
- NoC
- Trojan horses
- system-on-chip
- System recovery
- security attacks
- security
- secure routing algorithm
- secret key leaking
- runtime detection
- Runtime
- Routing
- Router Systems Security
- Resiliency
- resilience
- pubcrawl
- outsourcing
- network on chip security
- network-on-chip architecture
- network-on-chip
- network routing
- Multiprocessors System-on-Chip
- multiprocessing systems
- MPSoC
- Metrics
- Malicious-tolerant Routing Algorithm
- malicious Hardware Trojans
- logic design
- invasive software
- integrated circuits
- hardware trojan
- Hardware