Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of network-on-chip security attacks and countermeasures
With the advances of chip manufacturing technologies, computer architects have been able
to integrate an increasing number of processors and other heterogeneous components on …
to integrate an increasing number of processors and other heterogeneous components on …
Lightweight mitigation of hardware Trojan attacks in NoC-based manycore computing
Data-snoo** is a serious security threat in NoC fabrics that can lead to theft of sensitive
information from applications executing on manycore processors. Hardware Trojans (HTs) …
information from applications executing on manycore processors. Hardware Trojans (HTs) …
Packet header attack by hardware trojan in NoC based TCMP and its impact analysis
With the advancement of VLSI technology, Tiled Chip Multicore Processors (TCMP) with
packet switched Network-on-Chip (NoC) have been emerged as the backbone of the …
packet switched Network-on-Chip (NoC) have been emerged as the backbone of the …
Large-scale 3D chips: Challenges and solutions for design automation, testing, and trustworthy integration
Three-dimensional (3D) integration of electronic chips has been advocated by both industry
and academia for many years. It is acknowledged as one of the most promising approaches …
and academia for many years. It is acknowledged as one of the most promising approaches …
Digital watermarking for detecting malicious intellectual property cores in NoC architectures
System-on-chip (SoC) developers utilize intellectual property (IP) cores from third-party
vendors due to increasing design complexity, cost, as well as time-to-market constraints. A …
vendors due to increasing design complexity, cost, as well as time-to-market constraints. A …
Reconfigurable network-on-chip security architecture
Growth of the Internet-of-things has led to complex system-on-chips (SoCs) being used in
the edge devices in IoT applications. The increased complexity is demanding designers to …
the edge devices in IoT applications. The increased complexity is demanding designers to …
Dead flit attack on noc by hardware trojan and its impact analysis
With the advancement in VLSI technology, Tiled Chip Multicore Processors (TCMPs) with
packet switched Network-on-Chip (NoC) have emerged as the most popular design choice …
packet switched Network-on-Chip (NoC) have emerged as the most popular design choice …
A security aware routing approach for NoC-based MPSoCs
Malicious applications target Multi-Processors System-on-Chip (MPSoCs) to capture
sensitive information or disrupt normal operation; therefore, security is now a design …
sensitive information or disrupt normal operation; therefore, security is now a design …
Using smart routing for secure and dependable NoC-based MPSoCs
The Internet-of-Things (IoT) boosted the building of computational systems that share
computation, communication and storage resources for uncountable types of applications …
computation, communication and storage resources for uncountable types of applications …
Side-channel attack resilience through route randomisation in secure real-time networks-on-chip
LS Indrusiak, J Harbin… - 2017 12th International …, 2017 - ieeexplore.ieee.org
Security can be seen as an optimization objective in NoC resource management, and as
such poses trade-offs against other objectives such as real-time schedulability. In this paper …
such poses trade-offs against other objectives such as real-time schedulability. In this paper …