skip to main content
10.1145/3194554.3194582acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

Protecting Communication in Many-Core Systems against Active Attackers

Authors Info & Claims
Published:30 May 2018Publication History

ABSTRACT

The advent of hardware Trojans is posing an increasing threat on complex integrated circuits. Network-on-Chip, the established communication infrastructure for many core systems-on-chip, are growing in complexity. Integration of third-party components, which are increasingly becoming valuable targets, exposes the surface for attacks through the injection of hardware Trojans. In this paper, we address active attacks on NoCs, and focus on the integrity of transmitted data. Basically, we use network coding for the transmission of data in order to increase efficiency and robustness.

We introduce solutions that allow detection of active attacks under the consideration of the constraints in NoCs. The efficiency of these solutions is investigated by means of cycle-accurate simulations. Further, we develop an analytic approach for faster and more flexible but accurate evaluation. We finally analyze the area overhead using a state-of-the-art MPSoC and demonstrate that we can protect the integrity of data with reasonable effort.

References

  1. R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. 2000. Network information flow. IEEE Trans. on Inf. Theory 46, 4 (July 2000), 1204--1216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Y. Alkabani and F. Koushanfar. 2008. Extended abstract: Designer #x2019;s hardware Trojan horse. In IEEE HOST. 82--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Dean Michael Ancajas, Koushik Chakraborty, and Sanghamitra Roy. 2014. Fort-NoCs: Mitigating the Threat of a Compromised NoC. In Proc. of DAC. 158:1--158:6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L Benini and G De Micheli. 2002. Networks on chips: a new SoC paradigm. Computer 35, 1 (Jan. 2002), 70--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Travis Boraten and Avinash Karanth Kodi. 2016. Packet Security with Path Sensitization for NoCs. In Proc. of DATE. 1136--1139. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Julia Borghoff et al. 2012. PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications. Technical Report. 208--225 pages.Google ScholarGoogle Scholar
  7. Shekhar Borkar. 2007. Thousand Core Chips: A Technology Perspective. In Proc. of DAC. 746--749. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Philip A. Chou, Yunnan Wu, and Kamal Jain. 2003. Practical Network Coding. In Proc. Annual Allerton Conf. on Comm., Control, and Computing.Google ScholarGoogle Scholar
  9. W.J. Dally and B. Towles. 2001. Route packets, not wires: on-chip interconnection networks. In Proc. of DAC. 684--689. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Samuel Evain and Jean-Philippe Diguet. 2005. From NoC Security Analysis to Design Solutions. In Proc. of IEEE SiPS.Google ScholarGoogle ScholarCross RefCross Ref
  11. Samuel Evain and Jean-Philippe Diguet. 2005. From NoC Security Analysis to Design Solutions. Proc. of IEEE SiPS 1 (2005).Google ScholarGoogle ScholarCross RefCross Ref
  12. J. Frey and Qiaoyan Yu. 2015. Exploiting State Obfuscation to Detect Hardware Trojans in NoC Network Interfaces. In Proc. of IEEE MWSCAS. 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  13. Jonathan Frey and Qiaoyan Yu. 2016. A hardened network-on-chip design using runtime hardware Trojan mitigation methods. Integration, the VLSI journal 56 (2016), 15--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Haas et al. 2017. A heterogeneous SDR MPSoC in 28nmCMOS for low-latency wireless applications. In Proc. of DAC. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Axel Jantsch and Hannu Tenhunen. 2004. Will Networks on Chip Close the Productivity Gap? In Networks on Chip, Axel Jantsch and Hannu Tenhunen (Eds.). Springer US, 3--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Y. Jin, N. Kupp, and Y. Makris. 2009. Experiences in Hardware Trojan design and implementation. In IEEE HOST. 50--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Hemangee K. Kapoor et al. 2013. A Security Framework for NoC Using Authen- ticated Encryption and Session Keys. Circuits, Systems, and Signal Processing 32, 6 (2013), 2605--2622.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Leonard Kleinrock. 1975. Queueing systems - 1: Theory. Wiley, New York.Google ScholarGoogle Scholar
  19. Paul Kocher et al. 2004. Security as a New Dimension in Embedded System Design. In Proc. of DAC. 753--760. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Chae Hoon Lim and Tymur Korishko. 2006. mCrypton -- A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. In WISA 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sadia Moriam et al. 2015. Resilient and Efficient Communication in Many-Core Systems using Network Coding. In Proc. of IEEE IPCCC. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. NIST Special Publication 800--38A. 2001. Recommendation for Block Cipher Modes of Operation -- Methods and Techniques. U.S. DoC/NIST. (December 2001).Google ScholarGoogle Scholar
  23. Stefan Pfennig and Elke Franz. 2017. Security Aspects of Confidential Network Coding. In Proc. of IEEE ICC CISS.Google ScholarGoogle ScholarCross RefCross Ref
  24. M. Radetzki et al. 2013. Methods of Fault Tolerance in Networks-on-Chip. Comput. Surveys 46, 1 (Oct 2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Simha Sethumadhavan et al . 2015. Trustworthy Hardware from Untrusted Components. Comm. of the ACM 58, 9 (Aug. 2015), 60--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Gustavus J. Simmons (Ed.). 1991. Contemporary Cryptography -- The Science of Information Integrity. IEEE Press Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Protecting Communication in Many-Core Systems against Active Attackers

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            GLSVLSI '18: Proceedings of the 2018 on Great Lakes Symposium on VLSI
            May 2018
            533 pages
            ISBN:9781450357241
            DOI:10.1145/3194554

            Copyright © 2018 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 30 May 2018

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            GLSVLSI '18 Paper Acceptance Rate48of197submissions,24%Overall Acceptance Rate312of1,156submissions,27%

            Upcoming Conference

            GLSVLSI '24
            Great Lakes Symposium on VLSI 2024
            June 12 - 14, 2024
            Clearwater , FL , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader