Security-Driven Task Scheduling for Multiprocessor System-on-Chips with Performance Constraints
Title | Security-Driven Task Scheduling for Multiprocessor System-on-Chips with Performance Constraints |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Wang, Nan, Yao, Manting, Jiang, Dongxu, Chen, Song, Zhu, Yu |
Conference Name | 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) |
Date Published | July 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-7099-6 |
Keywords | composability, delays, graph theory, Hardware, hardware trojan, industrial property, intellectual property security, IP networks, logic design, malicious inclusions, MPSoC, multiprocessing systems, Multiprocessor System-on-Chips, performance constraints, policy-based governance, Processor scheduling, pubcrawl, resilience, Resiliency, schedule length, Schedules, scheduling, security, security of data, security-driven task scheduling, system level security constraints, System performance, system-on-chip, Task Analysis, task scheduling, Trojan horses, two-stage performance-constrained task scheduling algorithm |
Abstract | The high penetration of third-party intellectual property (3PIP) brings a high risk of malicious inclusions and data leakage in products due to the planted hardware Trojans, and system level security constraints have recently been proposed for MPSoCs protection against hardware Trojans. However, secret communication still can be established in the context of the proposed security constraints, and thus, another type of security constraints is also introduced to fully prevent such malicious inclusions. In addition, fulfilling the security constraints incurs serious overhead of schedule length, and a two-stage performance-constrained task scheduling algorithm is then proposed to maintain most of the security constraints. In the first stage, the schedule length is iteratively reduced by assigning sets of adjacent tasks into the same core after calculating the maximum weight independent set of a graph consisting of all timing critical paths. In the second stage, tasks are assigned to proper IP vendors and scheduled to time periods with a minimization of cores required. The experimental results show that our work reduces the schedule length of a task graph, while only a small number of security constraints are violated. |
URL | https://ieeexplore.ieee.org/document/8429426 |
DOI | 10.1109/ISVLSI.2018.00105 |
Citation Key | wang_security-driven_2018 |
- pubcrawl
- two-stage performance-constrained task scheduling algorithm
- Trojan horses
- task scheduling
- Task Analysis
- system-on-chip
- System performance
- system level security constraints
- security-driven task scheduling
- security of data
- security
- scheduling
- Schedules
- schedule length
- Resiliency
- resilience
- composability
- Processor scheduling
- policy-based governance
- performance constraints
- Multiprocessor System-on-Chips
- multiprocessing systems
- MPSoC
- malicious inclusions
- logic design
- IP networks
- intellectual property security
- industrial property
- hardware trojan
- Hardware
- graph theory
- delays