NoC-based protection for SoC time-driven attacks
Systems-on-chip (SoCs) based on many core architectures can be attacked. Malicious
processes can infer secrets from on-chip sensible traffic by evaluating the degradation on …
processes can infer secrets from on-chip sensible traffic by evaluating the degradation on …
Gossip noc--avoiding timing side-channel attacks through traffic management
The wide use of Multi-processing systems-on-chip (MPSoCs) in embedded systems and the
trend to increase the integration between devices have turned these systems vulnerable to …
trend to increase the integration between devices have turned these systems vulnerable to …
Side channel attack on NoC-based MPSoCs are practical: NoC Prime+ Probe attack
Many authors have shown how to break the AES cryptographic algorithm with side channel
attacks, specially the timing attacks oriented to caches, like Prime+ Probe. In this paper, we …
attacks, specially the timing attacks oriented to caches, like Prime+ Probe. In this paper, we …
TSA-NoC: Learning-based threat detection and mitigation for secure network-on-chip architecture
Networks-on-chip (NoCs) are playing a critical role in modern multicore architecture, and
NoC security has become a major concern. Maliciously implanted hardware Trojans (HTs) …
NoC security has become a major concern. Maliciously implanted hardware Trojans (HTs) …
EETD: An energy efficient design for runtime hardware trojan detection in untrusted network-on-chip
Network-on-chip (NoC) is a communication intellectual property (IP) core, popularly used in
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …
Towards the formal verification of security properties of a network-on-chip router
J Sepulveda, D Aboul-Hassan, G Sigl… - 2018 IEEE 23rd …, 2018 - ieeexplore.ieee.org
Vulnerabilities and design flaws in Network-on-Chip (NoC) routers can be exploited in order
to spy, modify and constraint the sensitive communication inside the Multi-Processors …
to spy, modify and constraint the sensitive communication inside the Multi-Processors …
Adding security to networks-on-chip using neural networks
K Madden, J Harkin, L McDaid… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Modern computing systems are using Networkson-Chip (NoCs) for scalable on-chip
communications. Traditional security attacks have focused on the computing cores however …
communications. Traditional security attacks have focused on the computing cores however …
Timing attack on NoC-based systems: Prime+ Probe attack and NoC-based protection
Many authors have shown how to break the AES cryptographic algorithm with side channel
attacks; specially the timing attacks oriented to caches, like Prime+ Probe. In this paper, we …
attacks; specially the timing attacks oriented to caches, like Prime+ Probe. In this paper, we …
Side-channel attack resilience through route randomisation in secure real-time networks-on-chip
LS Indrusiak, J Harbin… - 2017 12th International …, 2017 - ieeexplore.ieee.org
Security can be seen as an optimization objective in NoC resource management, and as
such poses trade-offs against other objectives such as real-time schedulability. In this paper …
such poses trade-offs against other objectives such as real-time schedulability. In this paper …
Multi-dimensional analysis of embedded systems security
The primary goals of this paper are to analyze the security of embedded systems at different
levels of abstraction and to propose a new procedure to assess and improve the security of …
levels of abstraction and to propose a new procedure to assess and improve the security of …