NoC-based protection for SoC time-driven attacks

MJ Sepulveda, JP Diguet, M Strum… - IEEE Embedded …, 2014 - ieeexplore.ieee.org
Systems-on-chip (SoCs) based on many core architectures can be attacked. Malicious
processes can infer secrets from on-chip sensible traffic by evaluating the degradation on …

Gossip noc--avoiding timing side-channel attacks through traffic management

C Reinbrecht, A Susin, L Bossuet… - 2016 IEEE Computer …, 2016 - ieeexplore.ieee.org
The wide use of Multi-processing systems-on-chip (MPSoCs) in embedded systems and the
trend to increase the integration between devices have turned these systems vulnerable to …

Side channel attack on NoC-based MPSoCs are practical: NoC Prime+ Probe attack

C Reinbrecht, A Susin, L Bossuet, G Sigl… - … 29th Symposium on …, 2016 - ieeexplore.ieee.org
Many authors have shown how to break the AES cryptographic algorithm with side channel
attacks, specially the timing attacks oriented to caches, like Prime+ Probe. In this paper, we …

TSA-NoC: Learning-based threat detection and mitigation for secure network-on-chip architecture

K Wang, H Zheng, A Louri - IEEE Micro, 2020 - ieeexplore.ieee.org
Networks-on-chip (NoCs) are playing a critical role in modern multicore architecture, and
NoC security has become a major concern. Maliciously implanted hardware Trojans (HTs) …

EETD: An energy efficient design for runtime hardware trojan detection in untrusted network-on-chip

M Hussain, A Malekpour, H Guo… - 2018 IEEE Computer …, 2018 - ieeexplore.ieee.org
Network-on-chip (NoC) is a communication intellectual property (IP) core, popularly used in
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …

Towards the formal verification of security properties of a network-on-chip router

J Sepulveda, D Aboul-Hassan, G Sigl… - 2018 IEEE 23rd …, 2018 - ieeexplore.ieee.org
Vulnerabilities and design flaws in Network-on-Chip (NoC) routers can be exploited in order
to spy, modify and constraint the sensitive communication inside the Multi-Processors …

Adding security to networks-on-chip using neural networks

K Madden, J Harkin, L McDaid… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Modern computing systems are using Networkson-Chip (NoCs) for scalable on-chip
communications. Traditional security attacks have focused on the computing cores however …

Timing attack on NoC-based systems: Prime+ Probe attack and NoC-based protection

C Reinbrecht, A Susin, L Bossuet, G Sigl… - Microprocessors and …, 2017 - Elsevier
Many authors have shown how to break the AES cryptographic algorithm with side channel
attacks; specially the timing attacks oriented to caches, like Prime+ Probe. In this paper, we …

Side-channel attack resilience through route randomisation in secure real-time networks-on-chip

LS Indrusiak, J Harbin… - 2017 12th International …, 2017 - ieeexplore.ieee.org
Security can be seen as an optimization objective in NoC resource management, and as
such poses trade-offs against other objectives such as real-time schedulability. In this paper …

Multi-dimensional analysis of embedded systems security

H Elmiligi, F Gebali, MW El-Kharashi - Microprocessors and Microsystems, 2016 - Elsevier
The primary goals of this paper are to analyze the security of embedded systems at different
levels of abstraction and to propose a new procedure to assess and improve the security of …